RTSP: RealServer SETUP Command Buffer Overflow (2)

This signature detects attempts to exploit a known vulnerability against the RealServer daemon running on Microsoft Windows XP. RealNetworks RealServer versions 8.0.2 and earlier are vulnerable. Attackers can send a SETUP command to the RealServer daemon and overflow the buffer to gain administrator access to the server.

Extended Description

RealNetworks has reported that buffer overflow vulnerabilities exist in Helix Universal Server/RealServer versions 8.01 and earlier. This is due to insufficient bounds checking of URIs by RTSP methods. Successful exploitation of these issues may result in execution of malicious instructions in the security context of the server process. The issues were reported on Microsoft Windows platforms but also may also affect other platforms. This issue may be related to previously reported issues (BID 6454, BID 6456 and BID 6458).

Affected Products

Real_networks real_server

Short Name
RTSP:REALSERVER:REAL-SETUP-OF2
Severity
Critical
Recommended
False
Recommended Action
Drop
Category
RTSP
Keywords
(2) Buffer Command Overflow RealServer SETUP bid:7020
Release Date
04/22/2003
Supported Platforms

srx-branch-12.3

srx-19.3

srx-branch-19.3

vsrx3bsd-19.2

srx-branch-19.4

vsrx-19.4

mx-12.3

mx-19.4

vmx-19.4

mx-19.3

vsrx3bsd-19.4

srx-19.4

vsrx-12.3

vmx-19.3

vsrx-19.2

srx-12.3

Sigpack Version
3336
Port
TCP/554
False Positive
Unknown
Vendors

Real_networks

Found a potential security threat?