Check Point Reference: | CPAI-2007-289 |
Date Published: | 4 Oct 2009 |
Severity: | High |
Last Updated: | Sunday 04 October, 2009 |
Source: | |
Industry Reference: | CVE-2007-3410 |
Protection Provided by: |
Security Gateway |
Who is Vulnerable? | |
Vulnerability Description | RealPlayer and RealOne Player are media player applications developed by RealNetworks, Inc. These applications are capable of playing back numerous multimedia file formats. The application can open multiple media formats from local file system or network servers. One of the media formats supported by RealPlayer is SMIL. A buffer overflow vulnerability exists in multiple multimedia products by RealNetworks. The vulnerability is due to the way RealPlayer and Helix Player products parse a specific format in Synchronized Multimedia Integration Language (SMIL) data. A remote attacker can exploit this vulnerability by convincing the target user to visit a malicious website or open a crafted file. Successful exploitation can allow execution of arbitrary code in the context of the logged in user. An attack targeting this vulnerability can result in the injection and execution of arbitrary code. If code execution is successful, the behaviour of the target will depend on the intention of the attacker. Any injected code will be executed within the security context of the currently logged in user. In the case of an unsuccessful code execution attack, the affected RealPlayer may terminate abnormally when parsing the malicious data. |
This protection will detect and block attempts to exploit this vulnerability
In order for the protection to be activated, update your Security Gateway product to the latest IPS update. For information on how to update IPS, go to SBP-2006-05, click on Protection tab and select the version of your choice.
This protection's log will contain the following information:
Attack Name: Media Player Enforcement Violation.
Attack Information: RealNetworks Multiple Products SMIL wallclock stack overflow