Stack-based buffer overflow in RealPlayer - CVE-2012-4987
Published: November 4, 2012 / Updated: August 11, 2020
RealPlayer
Detailed vulnerability description
The vulnerability allows a remote attacker to execute arbitrary code on the target system.
The vulnerability exists due to a boundary error when processing a crafted ZIP file that triggers incorrect processing of long pathnames by the Watch Folders feature. A remote unauthenticated attacker can trigger stack-based buffer overflow and execute arbitrary code on the target system.
Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.
How to mitigate CVE-2012-4987
Sources
- http://osvdb.org/86721
- http://packetstormsecurity.org/files/117691/Realplayer-Watchfolders-Long-Filepath-Overflow.html
- http://seclists.org/fulldisclosure/2012/Oct/189
- http://www.reactionpenetrationtesting.co.uk/realplayer-watchfolders.html
- http://www.securityfocus.com/bid/56324
- https://exchange.xforce.ibmcloud.com/vulnerabilities/79663