FreeBSD : realplayer -- remote heap overflow (c73305ae-8cd7-11d9-9873-000a95bc6fae)

medium Nessus Plugin ID 19116

Synopsis

The remote FreeBSD host is missing a security-related update.

Description

Two exploits have been identified in the Linux RealPlayer client.
RealNetworks states :

RealNetworks, Inc. has addressed recently discovered security vulnerabilities that offered the potential for an attacker to run arbitrary or malicious code on a customer's machine. RealNetworks has received no reports of machines compromised as a result of the now-remedied vulnerabilities. RealNetworks takes all security vulnerabilities very seriously.

The specific exploits were :

- Exploit 1: To fashion a malicious WAV file to cause a buffer overflow which could have allowed an attacker to execute arbitrary code on a customer's machine.

- Exploit 2: To fashion a malicious SMIL file to cause a buffer overflow which could have allowed an attacker to execute arbitrary code on a customer's machine.

Solution

Update the affected package.

See Also

https://www.real.com/

http://www.nessus.org/u?39b250f8

https://marc.info/?l=vulnwatch&m=110977858619314

Plugin Details

Severity: Medium

ID: 19116

File Name: freebsd_pkg_c73305ae8cd711d99873000a95bc6fae.nasl

Version: 1.17

Type: local

Published: 7/13/2005

Updated: 1/6/2021

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 5.5

CVSS v2

Risk Factor: Medium

Base Score: 5.1

Vector: CVSS2#AV:N/AC:H/Au:N/C:P/I:P/A:P

Vulnerability Information

CPE: p-cpe:/a:freebsd:freebsd:linux-realplayer, cpe:/o:freebsd:freebsd

Required KB Items: Host/local_checks_enabled, Host/FreeBSD/release, Host/FreeBSD/pkg_info

Patch Publication Date: 3/4/2005

Vulnerability Publication Date: 3/1/2005

Reference Information

CVE: CVE-2005-0611