blob: 742232a841711da90a25d76639e1dc6ad8f507c5 [file] [log] [blame]
<?xml version="1.0" encoding="utf-8"?>
<glsa id="200504-21">
<title>RealPlayer, Helix Player: Buffer overflow vulnerability</title>
RealPlayer and Helix Player are vulnerable to a buffer overflow that could
lead to remote execution of arbitrary code.
<product type="ebuild">RealPlayer</product>
<announced>April 22, 2005</announced>
<revised>April 22, 2005: 01</revised>
<package name="media-video/realplayer" auto="yes" arch="*">
<unaffected range="ge">10.0.4</unaffected>
<vulnerable range="lt">10.0.4</vulnerable>
<package name="media-video/helixplayer" auto="yes" arch="*">
<unaffected range="ge">1.0.4</unaffected>
<vulnerable range="lt">1.0.4</vulnerable>
RealPlayer is a multimedia player capable of handling multiple
multimedia file formats. Helix Player is the Open Source version of
Piotr Bania has discovered a buffer overflow vulnerability in
RealPlayer and Helix Player when processing malicious RAM files.
<impact type="normal">
By enticing a user to play a specially crafted RAM file an
attacker could execute arbitrary code with the permissions of the user
running the application.
There is no known workaround at this time.
All RealPlayer users should upgrade to the latest version:
# emerge --sync
# emerge --ask --oneshot --verbose &quot;&gt;=media-video/realplayer-10.0.4&quot;</code>
All Helix Player users should upgrade to the latest version:
# emerge --sync
# emerge --ask --oneshot --verbose &quot;&gt;=media-video/helixplayer-1.0.4&quot;</code>
<uri link="">CAN-2005-0755</uri>
<uri link="">RealNetworks Advisory</uri>
<metadata tag="requester" timestamp="Thu, 21 Apr 2005 08:25:50 +0000">
<metadata tag="submitter" timestamp="Thu, 21 Apr 2005 21:28:38 +0000">
<metadata tag="bugReady" timestamp="Fri, 22 Apr 2005 07:59:29 +0000">