APP: RealNetworks RealText Error Message Buffer Overflow

This signature detects attempts to exploit a known vulnerability against RealNetworks RealText. RealPlayer versions 1.6 and earlier are vulnerable. Attackers can craft malicious documents containing invalid version and name information. A successful attack can allow a remote attacker to execute arbitrary code and create files on the target client's system.

Extended Description

RealPlayer is prone to a remote heap-overflow vulnerability because the application fails to properly bounds-check user-supplied data before copying it to an insufficiently sized memory buffer. Specifically, the application fails to bounds-check user-supplied data contained in RealText files, resulting in the possibility of overflowing a heap buffer. Attackers can control the contents of critical memory control structures and write arbitrary data to arbitrary memory locations. Exploiting this issue allows attackers to execute arbitrary machine code in the context of the user running the affected application.

Affected Products

Suse linux_desktop

Short Name
APP:REAL:REALTEXT-ERR-OF
Severity
Minor
Recommended
False
Recommended Action
Drop
Category
APP
Keywords
Buffer CVE-2005-1766 Error Message Overflow RealNetworks RealText bid:14048
Release Date
07/01/2005
Supported Platforms

srx-branch-12.3

srx-19.3

srx-branch-19.3

vsrx3bsd-19.2

srx-branch-19.4

vsrx-19.4

mx-12.3

mx-19.4

vmx-19.4

mx-19.3

vsrx3bsd-19.4

srx-19.4

vsrx-12.3

vmx-19.3

vsrx-19.2

srx-12.3

Sigpack Version
3375
False Positive
Unknown
Vendors

Red_hat

Suse

Gentoo

Real_networks

CVSS Score

5.1

Found a potential security threat?