Short Name |
HTTP:STC:STREAM:REALMEDIA-PROC |
---|---|
Severity |
High |
Recommended |
No |
Recommended Action |
Drop |
Category |
HTTP |
Keywords |
RealNetworks RealPlayer RealMedia File Format Processing Heap Corruption |
Release Date |
2010/10/19 |
Update Number |
1794 |
Supported Platforms |
idp-4.0+, isg-3.0+, j-series-9.5+, mx-9.4+, srx-9.2+, srx-branch-9.4+, vsrx-12.1+ |
A remote heap corruption vulnerability exists in RealNetworks RealPlayer application. The vulnerability is due to boundary errors when processing RM files. A remote attacker can exploit this vulnerability by enticing the target user to open a crafted RM file. Successful exploitation would cause a memory corruption that may lead to arbitrary code execution in the security context of the logged in user. In an attack case where code injection is successful, the behaviour of the target is entirely dependent on the intended function of the injected code. The code in such a case would execute within the security context of the current user. In an attack case where code injection is not successful, if the affected RealPlayer or RealOne Player process will terminate abnormally.
RealNetworks RealPlayer is prone to multiple memory-corruption vulnerabilities that arise when the application processes specially crafted files. Successfully exploiting these issues will allow remote attackers to execute arbitrary code within the context of the affected application. Failed exploit attempts will cause a denial-of-service condition.