SMTP: RealNetworks RealPlayer WAV File Processing Buffer Overflow

This signature detects attempts to exploit a known vulnerability in RealNetworks RealPlayer. A successful attack can lead to a buffer overflow and arbitrary remote code execution within the context of the process's user.

Extended Description

RealNetworks RealPlayer and RealOne Player are reported prone to an unspecified buffer overflow vulnerability. It is reported that the issue manifests when a malicious WAV file is processed. The vulnerability affects heap-based memory. A remote attacker may exploit this vulnerability to execute arbitrary code in the context of a user that uses a vulnerable version of the media player to play a malicious WAV file.

Affected Products

Real_networks realone_player

References

BugTraq: 12697

CVE: CVE-2005-0611

Short Name
SMTP:REALPLAYER-WAV-BO
Severity
Major
Recommended
False
Recommended Action
Drop
Category
SMTP
Keywords
Buffer CVE-2005-0611 File Overflow Processing RealNetworks RealPlayer WAV bid:12697
Release Date
09/28/2010
Supported Platforms

srx-branch-12.3

srx-19.3

srx-branch-19.3

vsrx3bsd-19.2

srx-branch-19.4

vsrx-19.4

mx-12.3

mx-19.4

vmx-19.4

mx-19.3

vsrx3bsd-19.4

srx-19.4

vsrx-12.3

vmx-19.3

vsrx-19.2

srx-12.3

Sigpack Version
3375
False Positive
Unknown
Vendors

Red_hat

Real_networks

CVSS Score

5.1

Found a potential security threat?