Security Patch Update For Realplayer Enterprise
Updated November 10, 2005
RealNetworks, Inc. has recently discovered security vulnerabilities that offered the potential for an attacker to run arbitrary or malicious code on a customer's machine. RealNetworks has received no reports of machines compromised as a result of the now-remedied vulnerabilities. RealNetworks takes all security vulnerabilities very seriously.
The specific exploits were:
- Exploit 1: To fashion a malicious skin file to cause a stack overflow which could have allowed an attacker to execute arbitrary code on a customer's machine.
- Exploit 2: To fashion a malicious RealMedia file which could have caused stack overflow to allow an attacker to execute arbitrary code on a customer's machine.
- Exploit 3: To fashion a malicious skin file to cause a stack overflow which could have allowed an attacker to execute arbitrary code on a customer's machine. The buffer overrun was designed to occur in a 3rd-party compression library.
Impacted Products and Versions:
This affects versions 1.1, 1.2, 1.5, 1.6 and 1.7 of RealPlayer Enterprise (standalone and as configured by the RealPlayer Enterprise Manager).
To ensure that your Player is protected, we recommend installing the available update.
RealPlayer Enterprise Solution:
Please click here to get the updated RealPlayer Enterprise.
You PAM site will contain a complete / updated copy of RPEM / RDM.
RealNetworks would like to acknowledge John Heasman of NGS Software, and eEye Digital Security for bringing these exploits to our attention as well as those who subsequently worked with RealNetworks to correct the vulnerabilities.
RealNetworks Inc. endeavors to provide you with the highest quality products and services, but cannot guarantee, and does not warrant, that the operation of any RealNetworks product will be error-free, uninterrupted or secure. Please see your original license agreement for details of our limited warranty or warranty disclaimer.