APP: RealNetworks RealText Error Message Buffer Overflow
This signature detects attempts to exploit a known vulnerability against RealNetworks RealText. RealPlayer versions 1.6 and earlier are vulnerable. Attackers can craft malicious documents containing invalid version and name information. A successful attack can allow a remote attacker to execute arbitrary code and create files on the target client's system.
Extended Description
RealPlayer is prone to a remote heap-overflow vulnerability because the application fails to properly bounds-check user-supplied data before copying it to an insufficiently sized memory buffer. Specifically, the application fails to bounds-check user-supplied data contained in RealText files, resulting in the possibility of overflowing a heap buffer. Attackers can control the contents of critical memory control structures and write arbitrary data to arbitrary memory locations. Exploiting this issue allows attackers to execute arbitrary machine code in the context of the user running the affected application.
Affected Products
Suse linux_desktop
srx-branch-12.3
srx-19.3
srx-branch-19.3
vsrx3bsd-19.2
srx-branch-19.4
vsrx-19.4
mx-12.3
mx-19.4
vmx-19.4
mx-19.3
vsrx3bsd-19.4
srx-19.4
vsrx-12.3
vmx-19.3
vsrx-19.2
srx-12.3
Red_hat
Suse
Gentoo
Real_networks
5.1