Realplayer Watchfolders long Filepath Overflow

2012.10.27
Risk: High
Local: Yes
Remote: No
CWE: N/A


CVSS Base Score: 6.8/10
Impact Subscore: 6.4/10
Exploitability Subscore: 8.6/10
Exploit range: Remote
Attack complexity: Medium
Authentication: No required
Confidentiality impact: Partial
Integrity impact: Partial
Availability impact: Partial

Realplayer Watchfolders Long Filepath Overflow by Joseph Sheridan Summary Realplayer version 15.0.5.109 is vulnerable to a stack buffer overflow vulnerability in the 'Watch Folders' facility. CVE number: CVE-2012-4987 Impact: High Vendor homepage: http://www.real.com Vendor notified: 10/09/2012 Vendor response: The vendor initially responded to say that a representative would be in touch regarding the bug but no contact was made and no reply was made to several further emails. Credit: Joseph Sheridan of ReactionIS Affected Products Realplayer version 15.0.5.109, other versions may also be affected. Details A default Realplayer install has a 'Watch Folders' function which scans a (configurable) list of folders including Downloads and My Documents etc. If there is an overly long directory path (i.e. > 256 characters) then a null byte on the stack is overwritten and a buffer overflow subsequently occurs. As the following event log details show, it is possible to take full control of EIP: Faulting application name: RealPlay.exe, version: 15.0.5.109, time stamp: 0x4fe37037 Faulting module name: unknown, version: 0.0.0.0, time stamp: 0x00000000 Exception code: 0xc0000005 Fault offset: 0x61616161 Faulting process id: 0x157c Faulting application start time: 0x01cd7c9f57dcb90d The payload could be delivered by enticing a victim to extract a malicious zip file containing a random file with an overly long directory structure containing the exploit code. Impact An attacker may be able to take full control of the host and execute arbitrary code. Solution No known solution at this time. About ReactionIS Reaction Information Security is a leading independent pen test consultancy specialising in delivering the highest quality security testing services including network pen testing and web application security testing. As a CESG CHECK Service Provider we are authorised to carry out penetration testing on classified government networks.

References:

http://cxsecurity.com/issue/WLB-2012100156


Vote for this issue:
50%
50%


 

Thanks for you vote!


 

Thanks for you comment!
Your message is in quarantine 48 hours.

Comment it here.


(*) - required fields.  
{{ x.nick }} | Date: {{ x.ux * 1000 | date:'yyyy-MM-dd' }} {{ x.ux * 1000 | date:'HH:mm' }} CET+1
{{ x.comment }}

Copyright 2024, cxsecurity.com

 

Back to Top