Check Point Reference: | CPAI-2014-1356 |
Date Published: | 16 Apr 2014 |
Severity: | High |
Last Updated: | Wednesday 16 April, 2014 |
Source: | CVE-2010-4393 |
Industry Reference: | CVE-2010-4393 |
Protection Provided by: |
Security Gateway |
Who is Vulnerable? | |
Vulnerability Description | RealPlayer is a media player developed by RealNetworks Inc. It is capable of playing back numerous formats of multimedia files. AVI (Audio Video Interleave) is one of the video formats that is supported by RealPlayer. This file format links the audio part and the video part together and can be encoded using a wide selection of codecs. RealPlayer uses a plugin library called the video renderer, vidplin.dll, to parse AVI video files. A buffer overflow vulnerability has been reported in RealNetworks's Realplayer. The vulnerability is due to an error within vidplin.dll that fails to sufficiently verify user supplied data while parsing stream headers is an AVI file. A remote attacker may exploit this issue by enticing a target user to open a specially crafted AVI file. Successful exploitation of this vulnerability would allow an attacker to execute arbitrary code on the vulnerable system and could cause an abnormal termination of the affected product. |
This protection will detect and block attempts to exploit this vulnerability.
In order for the protection to be activated,
update your Security Gateway product to the latest IPS update.
For information on how to update IPS, go to
SBP-2006-05,
Protection tab and select the version of your choice.
SmartView Tracker will log the following entries:
Attack Name: Media Player Enforcement Violation.
Attack Information: Realplayer vidplin.dll AVI Header Parsing Code Execution - Ver2