CVE-2007-4599 – RealNetworks RealPlayer PLS File Memory Corruption Vulnerability
https://notcve.org/view.php?id=CVE-2007-4599
Stack-based buffer overflow in RealNetworks RealPlayer 10 and possibly 10.5, and RealOne Player 1 and 2, for Windows allows remote attackers to execute arbitrary code via a crafted playlist (PLS) file. Un desbordamiento de búfer en la región stack de la memoria en RealNetworks RealPlayer versiones 10 y posiblemente en 10.5, y RealOne Player versiones 1 y 2, para Windows, permite a atacantes remotos ejecutar código arbitrario por medio de un archivo de lista de reproducción (PLS) diseñada. This vulnerability allows remote attackers to execute code on vulnerable installations of RealPlayer. User interaction is required in that a user must open a malicious .pls file or visit a malicious web site. The specific flaw exists during the parsing of corrupted playlist files. Malicious corruption causes RealPlayer to call into a static heap address which can be leveraged by an attacker resulting in arbitrary code execution under the context of the logged in user. • http://osvdb.org/38341 http://secunia.com/advisories/27361 http://securitytracker.com/id?1018866 http://service.real.com/realplayer/security/10252007_player/en http://www.attrition.org/pipermail/vim/2007-October/001841.html http://www.securityfocus.com/archive/1/483112/100/0/threaded http://www.securityfocus.com/bid/26214 http://www.vupen.com/english/advisories/2007/3628 http://www.zerodayinitiative.com/advisories/ZDI-07-062.html https://exchange.xforce.ibmcloud.com/vulnerabilities • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •
CVE-2007-2264 – RealPlayer RA Field Size File Processing Heap Overflow Vulnerability
https://notcve.org/view.php?id=CVE-2007-2264
Heap-based buffer overflow in RealNetworks RealPlayer 8, 10, 10.1, and possibly 10.5; RealOne Player 1 and 2; and RealPlayer Enterprise allows remote attackers to execute arbitrary code via a RAM (.ra or .ram) file with a large size value in the RA header. Un desbordamiento de búfer en la región Heap de la memoria en RealNetworks RealPlayer las versiones 8, 10, 10.1 y posiblemente 10.5; RealOne Player versiones 1 y 2; y RealPlayer Enterprise permite a los atacantes remotos ejecutar código arbitrario por medio de un archivo RAM (.ra o .ram) con un valor de gran tamaño en el encabezado RA. This vulnerability allows remote attackers to execute code on vulnerable installations of RealPlayer. User interaction is required in that a user must open a malicious .ra/.ram file or visit a malicious web site. The specific flaw exists during the parsing of files with improperly defined size field in the RA header. Specifying a large unsigned value data can trigger a heap corruption and further result in arbitrary code execution under the context of the logged in user. • http://secunia.com/advisories/27361 http://securitytracker.com/id?1018866 http://service.real.com/realplayer/security/10252007_player/en http://www.attrition.org/pipermail/vim/2007-October/001841.html http://www.securityfocus.com/archive/1/483113/100/0/threaded http://www.securityfocus.com/bid/26214 http://www.vupen.com/english/advisories/2007/3628 http://www.zerodayinitiative.com/advisories/ZDI-07-063.html https://exchange.xforce.ibmcloud.com/vulnerabilities/37437 https://oval.cisecu • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •
CVE-2007-5601 – RealPlayer - 'ierpplug.dll' ActiveX Control Playlist Name Buffer Overflow
https://notcve.org/view.php?id=CVE-2007-5601
Stack-based buffer overflow in the Database Component in MPAMedia.dll in RealNetworks RealPlayer 10.5 and 11 beta, and earlier versions including 10, RealOne Player, and RealOne Player 2, allows remote attackers to execute arbitrary code via certain playlist names, as demonstrated via the import method to the IERPCtl ActiveX control in ierpplug.dll. Un desbordamiento de búfer en la región stack de la memoria en el Database Component en la biblioteca MPAMedia.dll en RealNetworks RealPlayer versiones 10.5 y 11 beta, y anteriores, incluyendo versión 10, RealOne Player y RealOne Player versión 2, permite a atacantes remotos ejecutar código arbitrario por medio de ciertos nombres de lista de reproducción, como es demostrado por medio del método import en el control ActiveX IERPCtl en la biblioteca ierpplug.dl. • https://www.exploit-db.com/exploits/16497 https://www.exploit-db.com/exploits/30692 http://secunia.com/advisories/27248 http://service.real.com/realplayer/security/191007_player/en http://www.infosecblog.org/2007/10/nasa-bans-ie.html http://www.kb.cert.org/vuls/id/871673 http://www.securityfocus.com/bid/26130 http://www.securitytracker.com/id?1018843 http://www.symantec.com/enterprise/security_response/weblog/2007/10/realplayer_exploit_on_the_loos.html http://www.us& • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •
CVE-2007-4904 – RealPlayer 11 - '.au' Denial of Service
https://notcve.org/view.php?id=CVE-2007-4904
RealNetworks RealPlayer 10.1.0.3114 and earlier, and Helix Player 1.0.6.778 on Fedora Core 6 (FC6) and possibly other platforms, allow user-assisted remote attackers to cause a denial of service (application crash) via a malformed .au file that triggers a divide-by-zero error. RealNetworks RealPlayer 10.1.0.3114 y anteriores, y Helix Player 1.0.6.778 sobre Fedora Core 6 (FC6) y posiblemente otras plataformas, permite a atacantes remotos con la intervención del usuario provocar denegación de servicio (caida de aplicación) a través de un archivo malformado .au que dispara un error de división por cero. • https://www.exploit-db.com/exploits/4683 http://archives.neohapsis.com/archives/fulldisclosure/2007-09/0154.html http://osvdb.org/39904 http://www.securityfocus.com/archive/1/479081/100/0/threaded http://www.securityfocus.com/bid/25627 https://exchange.xforce.ibmcloud.com/vulnerabilities/36545 • CWE-189: Numeric Errors •
CVE-2007-3410 – RealNetworks RealPlayer/HelixPlayer - SMIL wallclock Stack Overflow (PoC)
https://notcve.org/view.php?id=CVE-2007-3410
Stack-based buffer overflow in the SmilTimeValue::parseWallClockValue function in smlprstime.cpp in RealNetworks RealPlayer 10, 10.1, and possibly 10.5, RealOne Player, RealPlayer Enterprise, and Helix Player 10.5-GOLD and 10.0.5 through 10.0.8, allows remote attackers to execute arbitrary code via an SMIL (SMIL2) file with a long wallclock value. Un desbordamiento de búfer en la región stack de la memoria en la función SmilTimeValue::parseWallClockValue en el archivo smlprstime.cpp en RealNetworks RealPlayer versiones 10, 10.1 y posiblemente 10.5, RealOne Player, RealPlayer Enterprise y Helix Player versión 10.5-GOLD y versiones 10.0.5 hasta 10.0.8, permite a atacantes remotos ejecutar código arbitrario por medio de un archivo SMIL (SMIL2) con un valor wallclock largo. • https://www.exploit-db.com/exploits/4118 http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=547 http://osvdb.org/37374 http://osvdb.org/38342 http://secunia.com/advisories/25819 http://secunia.com/advisories/25859 http://secunia.com/advisories/26463 http://secunia.com/advisories/26828 http://secunia.com/advisories/27361 http://security.gentoo.org/glsa/glsa-200709-05.xml http://securitytracker.com/id?1018297 http://securitytracker.com/id?1018299 http:/& • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •