RealPlayer 'rjbdll.dll' ActiveX Control 'Import' Method Stack Buffer Overflow Vulnerability
BID:30379
Info
RealPlayer 'rjbdll.dll' ActiveX Control 'Import' Method Stack Buffer Overflow Vulnerability
| Bugtraq ID: | 30379 |
| Class: | Boundary Condition Error |
| CVE: |
CVE-2008-3066 |
| Remote: | Yes |
| Local: | No |
| Published: | Jul 25 2008 12:00AM |
| Updated: | Jul 29 2008 05:47PM |
| Credit: | Anonymous |
| Vulnerable: |
RealNetworks RealPlayer Enterprise RealNetworks RealPlayer 10.5 v6.0.12.1483 RealNetworks RealPlayer 10.5 v6.0.12.1483 RealNetworks RealPlayer 10.5 v6.0.12.1348 RealNetworks RealPlayer 10.5 v6.0.12.1235 RealNetworks RealPlayer 10.5 v6.0.12.1069 RealNetworks RealPlayer 10.5 v6.0.12.1059 RealNetworks RealPlayer 10.5 v6.0.12.1056 RealNetworks RealPlayer 10.5 v6.0.12.1053 RealNetworks RealPlayer 10.5 v6.0.12.1040 RealNetworks RealPlayer 10.5 Beta v6.0.12.1016 RealNetworks RealPlayer 10.5 RealNetworks RealPlayer 10.0 BETA RealNetworks RealPlayer 10.0 v6.0.12.690 RealNetworks RealPlayer 10.0 RealNetworks RealPlayer 10.5-GOLD |
| Not Vulnerable: |
RealNetworks RealPlayer 10.5 v6.0.12.1675 |
Discussion
RealPlayer 'rjbdll.dll' ActiveX Control 'Import' Method Stack Buffer Overflow Vulnerability
RealPlayer is prone to a stack-based buffer-overflow vulnerability because it fails to perform adequate boundary checks of user-supplied input before copying it to an insufficiently sized memory buffer.
Attackers can exploit this issue to execute arbitrary code in the context of the application using the affected control (typically Internet Explorer). Successful attacks can compromise the application and possibly the underlying computer. Failed attacks will likely cause denial-of-service conditions.
RealPlayer is prone to a stack-based buffer-overflow vulnerability because it fails to perform adequate boundary checks of user-supplied input before copying it to an insufficiently sized memory buffer.
Attackers can exploit this issue to execute arbitrary code in the context of the application using the affected control (typically Internet Explorer). Successful attacks can compromise the application and possibly the underlying computer. Failed attacks will likely cause denial-of-service conditions.
Exploit / POC
RealPlayer 'rjbdll.dll' ActiveX Control 'Import' Method Stack Buffer Overflow Vulnerability
Currently we are not aware of any working exploits. If you feel we are in error or if you are aware of more recent information, please mail us at: [email protected].
Currently we are not aware of any working exploits. If you feel we are in error or if you are aware of more recent information, please mail us at: [email protected].
Solution / Fix
RealPlayer 'rjbdll.dll' ActiveX Control 'Import' Method Stack Buffer Overflow Vulnerability
Solution:
The vendor has released updates. Please see the references for more information.
Solution:
The vendor has released updates. Please see the references for more information.
References
RealPlayer 'rjbdll.dll' ActiveX Control 'Import' Method Stack Buffer Overflow Vulnerability
References:
References:
- July 25, 2008 - RealNetworks, Inc. Releases Update to Address Security Vulnerabi (Real Networks)
- ZDI-08-046: RealNetworks RealPlayer Library File Deletion Stack Overflow ([email protected])
- RealNetworks RealPlayer Library File Deletion Stack Overflow (Zero Day Initiative)
- Vulnerability Note VU#461187 - RealPlayer file deletion overflow vulnerability (US-CERT)