blob: 606a7fa71cf7f46b5ac904ec2b24c6305ea1bd56 [file] [log] [blame]
<?xml version="1.0" encoding="utf-8"?>
<glsa id="200709-05">
<title>RealPlayer: Buffer overflow</title>
RealPlayer is vulnerable to a buffer overflow allowing for execution of
arbitrary code.
<product type="ebuild">realplayer</product>
<announced>September 14, 2007</announced>
<revised>September 14, 2007: 01</revised>
<package name="media-video/realplayer" auto="yes" arch="*">
<unaffected range="ge">10.0.9</unaffected>
<vulnerable range="lt">10.0.9</vulnerable>
RealPlayer is a multimedia player capable of handling multiple
multimedia file formats.
A stack-based buffer overflow vulnerability has been reported in the
SmilTimeValue::parseWallClockValue() function in smlprstime.cpp when
handling HH:mm:ss.f type time formats.
<impact type="normal">
By enticing a user to open a specially crafted SMIL (Synchronized
Multimedia Integration Language) file, an attacker could be able to
execute arbitrary code with the privileges of the user running the
There is no known workaround at this time.
All RealPlayer users should upgrade to the latest version:
# emerge --sync
# emerge --ask --oneshot --verbose &quot;&gt;=media-video/realplayer-10.0.9&quot;</code>
<uri link="">CVE-2007-3410</uri>
<metadata tag="requester" timestamp="Wed, 29 Aug 2007 10:19:49 +0000">
<metadata tag="bugReady" timestamp="Wed, 29 Aug 2007 10:19:58 +0000">
<metadata tag="submitter" timestamp="Sun, 09 Sep 2007 20:21:51 +0000">