blob: c9929b9916fc9b6985e1cfd7ec649aa7bc24e4d8 [file] [log] [blame]
<?xml version="1.0" encoding="utf-8"?>
<glsa id="200510-07">
<title>RealPlayer, Helix Player: Format string vulnerability</title>
RealPlayer and Helix Player are vulnerable to a format string vulnerability
resulting in the execution of arbitrary code.
<product type="ebuild">realplayer helixplayer</product>
<announced>October 07, 2005</announced>
<revised>November 22, 2005: 02</revised>
<package name="media-video/realplayer" auto="yes" arch="*">
<unaffected range="ge">10.0.6</unaffected>
<vulnerable range="lt">10.0.6</vulnerable>
<package name="media-video/helixplayer" auto="yes" arch="*">
<vulnerable range="lt">1.0.6</vulnerable>
RealPlayer is a multimedia player capable of handling multiple
multimedia file formats. Helix Player is an open source media player
for Linux.
"c0ntex" reported that RealPlayer and Helix Player suffer from a heap
<impact type="normal">
By enticing a user to play a specially crafted realpix (.rp) or
realtext (.rt) file, an attacker could execute arbitrary code with the
permissions of the user running the application.
There is no known workaround at this time.
All RealPlayer users should upgrade to the latest version:
# emerge --sync
# emerge --ask --oneshot --verbose &quot;&gt;=media-video/realplayer-10.0.6&quot;</code>
Note to Helix Player users: There is currently no stable secure Helix
Player package. Affected users should remove the package until an
updated Helix Player package is released.
<uri link="">CAN-2005-2710</uri>
<metadata tag="requester" timestamp="Sat, 01 Oct 2005 10:35:35 +0000">
<metadata tag="submitter" timestamp="Tue, 04 Oct 2005 19:39:34 +0000">
<metadata tag="bugReady" timestamp="Fri, 07 Oct 2005 14:20:23 +0000">