Juniper Networks
Solutions
Products & Services
Company
Partners
Support
Education

Signature Detail

Security Intelligence Center
Signatures
Print

Short Name

RTSP:REALSERVER:MAL-HEADER

Severity

Critical

Recommended

No

Recommended Action

Drop

Category

RTSP

Keywords

RealServer Multiple "Require" Headers Exploit

Release Date

2007/08/29

Update Number

1213

Supported Platforms

idp-4.0+, isg-3.0+, j-series-9.5+, mx-9.4+, srx-9.2+, srx-branch-9.4+, vsrx-12.1+

RTSP: RealServer Multiple "Require" Headers Exploit


This signature detects attempts to exploit a known vulnerability in RealNetworks Helix DNA Server 11.x prior to 11.1.4. A successful attack can lead to a buffer overflow and arbitrary remote code execution within the context of the server (SYSTEM).

Extended Description

RealNetworks Helix DNA Server is prone to a heap-based buffer-overflow vulnerability because it fails to perform sufficient boundary checks on user-supplied data before copying it to an insufficiently sized memory buffer. An attacker could leverage this issue to execute arbitrary code within the context of the affected application. Failed exploit attempts will result in a denial-of-service condition. This issue affects versions prior to Helix Server 11.1.4.

Affected Products

  • Real Networks Helix DNA Server 11.1.1
  • Real Networks Helix DNA Server 11.1.2
  • Real Networks Helix DNA Server 11.1.3

References

  • BugTraq: 25440
  • CVE: CVE-2007-4561
  • URL: http://labs.musecurity.com/wp-content/uploads/2007/08/mu-200708-01.txt

Site Map
RSS Feeds
Careers
Accessibility
Feedback
Privacy Policy
Legal Notices
Copyright © 1999-2010 Juniper Networks, Inc. All rights reserved.
Help
|
My Account
|
Log Out