[41147] in bugtraq

home help back first fref pref prev next nref lref last post

High Risk Flaw in RealPlayer

daemon@ATHENA.MIT.EDU (NGSSoftware Insight Security Resea)
Sat Nov 12 12:00:24 2005

Message-ID: <001b01c5e6df$3722cc10$2500a8c0@ngssoftware.com>
From: "NGSSoftware Insight Security Research" <nisr@nextgenss.com>
To: <bugtraq@securityfocus.com>, <ntbugtraq@listserv.ntbugtraq.com>
Date: Fri, 11 Nov 2005 16:44:42 -0000
MIME-Version: 1.0
Content-Type: text/plain;
	format=flowed;
	charset="iso-8859-1";
	reply-type=original
Content-Transfer-Encoding: 7bit

John Heasman of NGSSoftware has discovered a high risk vulnerability in 
RealPlayer.
Versions affected include:

RealPlayer 10.5 (6.0.12.1040-1235)
RealPlayer 10

(Note: RealOne Player v1 & v2, RealPlayer 8 and RealPlayer Enterprise have 
also been updated to resolve issues reported by other security researchers)

The flaw permits execution of arbitrary code via a malformed image contained 
within a skin file. The update can be downloaded from

http://service.real.com/help/faq/security/051110_player/EN/

NGSSoftware are going to withhold details of this flaw for three months. 
Full details will be published on the 11th of January 2006. This three month 
window will allow users of RealPlayer the time needed to apply the patch 
before the details are released to the general public. This reflects 
NGSSoftware's approach to responsible disclosure.


NGSSoftware Insight Security Research
http://www.nextgenss.com/
+44(0)208 401 0070



home help back first fref pref prev next nref lref last post