RealPlayer Data Packet Stack Overflow

Credit: Karl Lynn
Risk: High
Local: No
Remote: Yes
CWE: CWE-Other

CVSS Base Score: 5.1/10
Impact Subscore: 6.4/10
Exploitability Subscore: 4.9/10
Exploit range: Remote
Attack complexity: High
Authentication: No required
Confidentiality impact: Partial
Integrity impact: Partial
Availability impact: Partial

RealPlayer Data Packet Stack Overflow Release Date: November 10, 2005 Date Reported: May 28, 2005 Severity: High (Remote Code Execution) Vendor: RealNetworks Systems Affected: Windows: RealPlayer 10.5 ( RealPlayer 10 RealOne Player v2 RealOne Player v1 RealPlayer 8 RealPlayer Enterprise Mac: RealPlayer 10 Linux: RealPlayer 10 (10.0.0 - 5) Helix Player (10.0.0 - 5) Overview: eEye Digital Security has discovered a critical vulnerability in RealPlayer. The vulnerability allows a remote attacker to reliably overwrite stack memory with arbitrary data and execute arbitrary code in the context of the user who executed the player. This specific flaw exists in the first data packet contained in a Real Media file. By specially crafting a malformed .rm movie file, a direct stack overwrite is triggered, and reliable code execution is then possible. Technical Details: The vulnerability is triggered by setting the application specific length field of the [data packet + 1] to 0x80 - 0xFF this will cause a stack overflow. The value is sign-extended and passed as the length to memcpy. Protection: Retina Network Security Scanner has been updated to identify this vulnerability. Blink End Point Protection proactively protects against this vulnerability Vendor Status: RealNetworks has released a patch for this vulnerability. The patch is available via the "Check for Update" menu item under Tools on the RealPlayer menu bar or from Credit: Karl Lynn Related Links: This advisory has been assigned the following ID numbers; EEYEB-20050510 OSVDB ID: 18822 CVE ID: CAN-2005-2629 Greetings: Brett Moore, Mark Dowd, Paul Gese @ RealNetworks, Mike Schiffman, AJREZ, Luke, Derek "TEX" Soeder, Andre Audits, "The Claw", and Dug Song. Copyright (c) 1998-2005 eEye Digital Security Permission is hereby granted for the redistribution of this alert electronically. It is not to be edited in any way without express consent of eEye. If you wish to reprint the whole or any part of this alert in any other medium excluding electronic medium, please email alert (at) eEye (dot) com [email concealed] for permission. Disclaimer The information within this paper may change without notice. Use of this information constitutes acceptance for use in an AS IS condition. There are no warranties, implied or express, with regard to this information. In no event shall the author be liable for any direct or indirect damages whatsoever arising out of or in connection with the use or spread of this information. Any use of this information is at the user's own risk.

Vote for this issue:


Thanks for you vote!


Thanks for you comment!
Your message is in quarantine 48 hours.

Comment it here.

(*) - required fields.  
{{ x.nick }} | Date: {{ x.ux * 1000 | date:'yyyy-MM-dd' }} {{ x.ux * 1000 | date:'HH:mm' }} CET+1
{{ x.comment }}

Copyright 2022,


Back to Top