SB2007101701 - Remote code execution in RealNetworks RealPlayer



SB2007101701 - Remote code execution in RealNetworks RealPlayer

Published: October 17, 2007 Updated: December 16, 2016

Security Bulletin ID SB2007101701
Severity
Critical
Patch available
YES
Number of vulnerabilities 1
Exploitation vector Remote access
Highest impact Code execution

Breakdown by Severity

Critical 100%
  • Low
  • Medium
  • High
  • Critical

Description

This security bulletin contains information about 1 security vulnerability.


1) Stack-based buffer overflow (CVE-ID: CVE-2007-5601)

The vulnerability allows a remote user to execute arbitrary code on the target system.

The vulnerability exists due to boundary error when processing playlist names passed via "Import()" method to RealPlayer IERPCtl ActiveX control (ierpplug.dll). A remote attacker can create a specially crafted web page, trick the victim into opening it, cause stack-based buffer overflow and execute arbitrary code with privileges of the current user.

Successful exploitation of the vulnerability results in compromise of vulnerable system.

Note: this vulnerability is being actively exploited.


Remediation

Install update from vendor's website.