Check Point Reference: | CPAI-2005-305 |
Date Published: | 11 Oct 2009 |
Severity: | High |
Last Updated: | Sunday 11 October, 2009 |
Source: | |
Industry Reference: | CVE-2005-2710 |
Protection Provided by: |
Security Gateway |
Who is Vulnerable? | |
Vulnerability Description | RealPlayer and Helix Player are media players developed by RealNetworks, Inc. These applications are capable of playing back numerous multimedia file formats. They support a streaming slide show technology called RealPix that allows for the creation of presentations that include image content. The RealPix format is a proprietary RealNetworks multimedia format. A format string vulnerability exists in the RealNetworks RealPlayer and Helix Player products. A remote user may exploit this flaw by supplying a crafted RealPix multimedia file to a vulnerable target. The vulnerability may be exploited to divert process flow of the vulnerable application and execute arbitrary code in the security context of the current user running the vulnerable product. In an unsuccessful code injection attack case, the vulnerable application may unexpectedly terminate as a result. In a successful attack scenario, arbitrary code may be injected and executed on the target system. In such a case, the behaviour of the target system is dependent on the intent of the malicious code. |
This protection will detect and block attempts to exploit this vulnerability
In order for the protection to be activated, update your Security Gateway product to the latest IPS update. For information on how to update IPS, go to SBP-2006-05, click on Protection tab and select the version of your choice.
This protection's log will contain the following information:
Attack Name: Media Player Enforcement Violation.
Attack Information: RealNetworks RealPlayer error message format string