RealNetworks, Inc. Releases Update to Address Security Vulnerabilities.

Updated August 23, 2013

 

RealNetworks is making available product upgrades that contain security bug fixes. We have received no reports of any machines actually being compromised as a result of the now-remedied vulnerabilities.

RealNetworks always recommends upgrading your product to the most current version available to avoid security vulnerabilities. 



 

Current Software
The current versions of our Player software are not affected by these vulnerabilities.

Software

Affected?

Operating System

Language

RealPlayer 16.0.3.51

No

Windows XP, Vista, Win7, Win8

All Supported

Mac RealPlayer 12.0.1.1738

No

Mac OS X 10.3 – 10.8.2

All Supported

 

Affected Software
The table below contains a summary of which previous and current versions of the RealPlayer software are susceptible to these vulnerabilities. The columns and cells in green are the versions of each product where the issue has been resolved.

 

CVE Number

RealPlayer
11.0 – 11.1

RealPlayer SP 1.0 – 1.1.5

RealPlayer 14.0.0 – 16.0.2.32

RealPlayer 16.0.3.51

 

Mac RealPlayer 12.0.0.1701

Mac RealPlayer 12.0.1.1738

CVE-2013-4973

X

X

X

 

CVE-2013-4974

X

X

X

 

 

CVE Descriptions

 

CVE-2013-4973

RealPlayer - Stack buffer overflow in Player when handling filenames in RMP

Affected software: Windows RealPlayer 16.0.2.32 and prior.

Credit to hamburgers maccoy for reporting this issue.

 

CVE-2013-4974

RealPlayer - RM Memory corruption vulnerability when parsing a malformed RealMedia file

Affected software: Windows RealPlayer 16.0.2.32 and prior.

Credit to Jeremy Brown of Microsoft and MSVR for reporting this issue.

 

 

Warranty:

RealNetworks Inc. endeavors to provide you with the highest quality products and services, but cannot guarantee, and does not warrant, that the operation of any RealNetworks product will be error-free, uninterrupted or secure. Please see your original license agreement for details of our limited warranty or warranty disclaimer.