RealPlayer for Windows < Build 12.0.0.879 Multiple Vulnerabilities

high Nessus Plugin ID 48907

Language:

Synopsis

The remote Windows application is affected by multiple vulnerabilities.

Description

According to its build number, the installed version of RealPlayer on the remote Windows host has multiple buffer overflow vulnerabilities :

- A RealPlayer malformed 'IVR' pointer index code execution vulnerability exists. (CVE-2010-2996, CVE-2010-2998)

- A RealPlayerActiveX unauthorized file access vulnerability exists. (CVE-2010-3002)

- A RealPlayer 'QCP' file parsing integer overflow vulnerability exists. (CVE-2010-0116)

- A vulnerability exists in the way RealPlayer processes the dimensions in the 'YUV420' transformation of 'MP4' content. (CVE-2010-0117)

- A heap-based buffer overflow vulnerability exists in RealPlayer's 'QCP' parsing. (CVE-2010-0120)

- A vulnerability exists in the ActiveX IE plugin relating to the opening of multiple browser windows. (CVE-2010-3001)

- Multiple integer overflow vulnerabilities exist in RealPlayer's 'FLV' parsing. (CVE-2010-3000)
- An uninitialized pointer vulnerability exists in the CDDA URI ActiveX Control. (CVE-2010-3747)
- A remote code execution vulnerability exists in RJMDSections. (CVE-2010-3750)
- A RealPlayer 'QCP' parsing heap-based buffer overflow vulnerability exists. (CVE-2010-2578)

- A remote code execution issue exists in multiple protocol handlers for the RealPlayer ActiveX control.
(CVE-2010-3751)

- A stack overflow vulnerability exists in the RichFX component. (CVE-2010-3748)

- A parameter injection vulnerability exists in the RecordClip browser extension. (CVE-2010-3749)

Solution

Upgrade to RealPlayer SP 1.1.5 or later.

See Also

https://www.zerodayinitiative.com/advisories/ZDI-10-166/

https://www.zerodayinitiative.com/advisories/ZDI-10-167/

https://www.zerodayinitiative.com/advisories/ZDI-10-209/

https://www.zerodayinitiative.com/advisories/ZDI-10-210/

https://www.zerodayinitiative.com/advisories/ZDI-10-211/

https://www.zerodayinitiative.com/advisories/ZDI-10-212/

https://www.zerodayinitiative.com/advisories/ZDI-10-213/

https://secuniaresearch.flexerasoftware.com/secunia_research/2010-8/

https://secuniaresearch.flexerasoftware.com/secunia_research/2010-3/

https://secuniaresearch.flexerasoftware.com/secunia_research/2010-5/

http://service.real.com/realplayer/security/08262010_player/en/

http://service.real.com/realplayer/security/10152010_player/en/

Plugin Details

Severity: High

ID: 48907

File Name: realplayer_12_0_0_879.nasl

Version: 1.25

Type: local

Agent: windows

Family: Windows

Published: 8/27/2010

Updated: 11/15/2018

Supported Sensors: Nessus Agent, Nessus

Risk Information

VPR

Risk Factor: High

Score: 8.9

CVSS v2

Risk Factor: High

Base Score: 9.3

Temporal Score: 8.1

Vector: CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C

Vulnerability Information

CPE: cpe:/a:realnetworks:realplayer

Required KB Items: SMB/RealPlayer/Product, SMB/RealPlayer/Build

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 8/26/2010

Vulnerability Publication Date: 8/26/2010

Exploitable With

CANVAS (D2ExploitPack)

Core Impact

Metasploit (RealNetworks RealPlayer CDDA URI Initialization Vulnerability)

Reference Information

CVE: CVE-2010-0116, CVE-2010-0117, CVE-2010-0120, CVE-2010-2578, CVE-2010-2996, CVE-2010-2998, CVE-2010-3000, CVE-2010-3001, CVE-2010-3002, CVE-2010-3747, CVE-2010-3748, CVE-2010-3749, CVE-2010-3750, CVE-2010-3751

BID: 42775, 44423, 44440, 44441, 44442, 44443, 44444, 44450

MSVR: MSVR11-004

Secunia: 41096, 41154