RealNetworks RealPlayer ActiveX Playlist Vulnerability
Original release date: October 24, 2007
Last revised: --
Source: US-CERT
Systems Affected
- RealOne Player
- RealOne Player v2
- RealPlayer 10
- RealPlayer 10.5
- RealPlayer 11 beta
Overview
RealNetworks RealPlayer for Microsoft Windows contains a vulnerability that could allow an attacker to take control of your computer when you visit a malicious web site.
Solution
Upgrade and install a patch
RealNetworks has released a patch to address this vulnerability. Information about the vulnerability and the patch is available in RealPlayer Security Vulnerability and Security Update for Real Player.
- RealPlayer 10.5 and RealPlayer 11 beta users should install the patch.
- RealOne Player v2, and RealPlayer 10 users should upgrade to RealPlayer 10.5 or RealPlayer 11 beta and then install the patch.
Windows versions of RealPlayer 8 and earlier are not affected. Mactintosh and Linux versions of RealPlayer are not affected.
Disable ActiveX for untrusted web sites
Disabling ActiveX in the Internet Zone (or any zone used by an attacker) reduces the chances of exploitation of this and other vulnerabilities. Instructions for disabling ActiveX in the Internet Zone can be found in the "Securing Your Web Browser" document.
There are public reports that this vulnerability is being actively exploited.
Description
A buffer overflow in the way RealPlayer handles playlists received from an ActiveX control on a web page could allow an attacker to access your computer, install and run malicious software on your computer, or cause it to crash.
More technical information is available in US-CERT Technical Cyber Security Alert TA07-297A and Vulnerability Note VU#871673.
References
Feedback can be directed to US-CERT.
Produced 2007 by US-CERT, a government organization. Terms of use
Revision History
October 24, 2007: Initial release