Check Point Reference: | CPAI-2005-192 |
Date Published: | 4 Jan 2010 |
Severity: | Medium |
Last Updated: | Monday 04 January, 2010 |
Source: | |
Industry Reference: | CVE-2005-2055 |
Protection Provided by: |
Security Gateway |
Who is Vulnerable? | |
Vulnerability Description | RealPlayer is a media player produced by RealNetworks, Inc. that supports a variety of open and proprietary multimedia stream and file formats. Versions of RealPlayer are available for most common platforms such as Windows, Linux, Solaris, etc. A vulnerability exists in the way that RealNetworks line of RealPlayer products handle clip-encoded URLs. A malicious website can load a local HTML document in the local zone security context by using a specially crafted RealMedia file. An attacker exploiting this flaw can bypass certain security restrictions. In a successful attack case, the built-in browser of the vulnerable RealPlayer will open the local file referenced in the malicious RealMedia file. The behavior of the target system is entirely dependent on the intended purpose of the code embedded in the malicious local file. In addition, system's behavior is also dependent on the version of the Windows operating system. |
This protection will detect and block attempts to exploit this vulnerability.
In order for the protection to be activated, update your Security Gateway product to the latest IPS update. For information on how to update IPS, go to SBP-2006-05, click on Protection tab and select the version of your choice.
This protection's log will contain the following information:
Attack Name: Content Protection Violation.
Attack Information: RealNetworks RealPlayer RealMedia security bypass