Short Name |
HTTP:STC:STREAM:REALPLAYER-MP3 |
---|---|
Severity |
High |
Recommended |
No |
Recommended Action |
Drop |
Category |
HTTP |
Keywords |
RealNetworks RealPlayer MP3 Files Processing Buffer Overflow |
Release Date |
2010/10/19 |
Update Number |
1794 |
Supported Platforms |
idp-4.0+, isg-3.1.134269+, j-series-9.5+, mx-9.4+, srx-9.2+, srx-branch-9.4+, vsrx-12.1+ |
This signature detects attempts to exploit a known remote buffer overflow vulnerability in RealNetworks RealPlayer application. It is due to boundary errors when processing Lyrics3 v2.00 tags in MP3 files. A remote attacker can exploit this by enticing the target user to open a crafted MP3 file. A successful attack causes a heap-based buffer overflow that can lead to arbitrary code execution in the security context of the logged in user. The behavior of the target is entirely dependent on the intended function of the injected code. In an unsuccessful attack, the affected RealPlayer or RealOne Player process terminates abnormally.
RealNetworks RealPlayer is prone to multiple memory-corruption vulnerabilities that arise when the application processes specially crafted files. Successfully exploiting these issues will allow remote attackers to execute arbitrary code within the context of the affected application. Failed exploit attempts will cause a denial-of-service condition.