Alert

RealNetworks RealPlayer ActiveX Playlist Buffer Overflow

Last Revised
Alert Code
SA07-297A

Systems Affected

  • RealOne Player
  • RealOne Player v2
  • RealPlayer 10
  • RealPlayer 10.5
  • RealPlayer 11 beta

Overview

RealNetworks RealPlayer for Microsoft Windows contains a vulnerability that could allow an attacker to take control of your computer when you visit a malicious web site.


Solution

Upgrade and install a patch

RealNetworks has released a patch to address this vulnerability. Information about the vulnerability and the patch is available in RealPlayer Security Vulnerability and Security Update for Real Player.

  • RealPlayer 10.5 and RealPlayer 11 beta users should install the patch.
  • RealOne Player v2, and RealPlayer 10 users should upgrade to RealPlayer 10.5 or RealPlayer 11 beta and then install the patch.

Windows versions of RealPlayer 8 and earlier are not affected. Mactintosh and Linux versions of RealPlayer are not affected.

Disable ActiveX for untrusted web sites

Disabling ActiveX in the Internet Zone (or any zone used by an attacker) reduces the chances of exploitation of this and other vulnerabilities. Instructions for disabling ActiveX in the Internet Zone can be found in the "Securing Your Web Browser" document.

There are public reports that this vulnerability is being actively exploited.

Description

A buffer overflow in the way RealPlayer handles playlists received from an ActiveX control on a web page could allow an attacker to access your computer, install and run malicious software on your computer, or cause it to crash.

More technical information is available in US-CERT Technical Cyber Security Alert TA07-297A and Vulnerability Note VU#871673.


References


.

Revision History

  • October 24, 2007: Initial release

This product is provided subject to this Notification and this Privacy & Use policy.