FreeBSD VuXML: Documenting security issues in FreeBSD and the FreeBSD Ports Collection

linux-realplayer -- heap overflow

Affected packages
10.0.1 <= linux-realplayer < 10.0.6

Details

VuXML ID fe4c84fc-bdb5-11da-b7d4-00123ffe8333
Discovery 2006-03-23
Entry 2006-03-27

iDefense Reports:

Remote exploitation of a heap-based buffer overflow in RealNetwork Inc's RealPlayer could allow the execution of arbitrary code in the context of the currently logged in user.

In order to exploit this vulnerability, an attacker would need to entice a user to follow a link to a malicious server. Once the user visits a website under the control of an attacker, it is possible in a default install of RealPlayer to force a web-browser to use RealPlayer to connect to an arbitrary server, even when it is not the default application for handling those types, by the use of embedded object tags in a webpage. This may allow automated exploitation when the page is viewed.

References

CVE Name CVE-2005-2922
URL http://secunia.com/advisories/19358/
URL http://service.real.com/realplayer/security/03162006_player/en/
URL http://www.idefense.com/intelligence/vulnerabilities/display.php?id=404