Check Point Reference: | CPAI-2004-112 |
Date Published: | 16 Sep 2010 |
Severity: | Medium |
Last Updated: | Thursday 16 September, 2010 |
Source: | |
Industry Reference: | CVE-2004-0258 |
Protection Provided by: |
Security Gateway |
Who is Vulnerable? | |
Vulnerability Description | RealPlayer is a media player produced by RealNetworks, Inc. that supports a variety of open and proprietary multimedia stream and file formats. Versions of RealPlayer are available for most common platforms such as Windows, Linux, Solaris, etc. There exists a buffer overflow vulnerability in RealPlayer. The vulnerability is caused due to an improper handling of certain metafiles and streaming-image files. There are certain RealAudio specific text based file types that are used to facilitate the loading of RealAudio media files. In case of an attack where code injection is not successful, the vulnerable RealPlayer client would terminate abnormally. The RealAudio client must be restarted for the RealPlayer client to continue. In case of an attack where code injection and execution is successful, the behavior of the target system is entirely dependent on the intended purpose of the injected code. Any code injected would run in the security context of the user running Real Player. |
This protection will detect and block attempts to exploit this vulnerability.
In order for the protection to be activated, update your Security Gateway product to the latest IPS update. For information on how to update IPS, go to SBP-2006-05, click on Protection tab and select the version of your choice.
This protection's log will contain the following information:
Attack Name: Media Player Enforcement Violation.
Attack Information: RealNetworks RealPlayer buffer overflow