blob: ce9e8be49561026d7374e70ef1f0c341c0d45a10 [file] [log] [blame]
<?xml version="1.0" encoding="utf-8"?>
<glsa id="200809-03">
<title>RealPlayer: Buffer overflow</title>
RealPlayer is vulnerable to a buffer overflow allowing for the execution of
arbitrary code.
<product type="ebuild">realplayer</product>
<announced>September 04, 2008</announced>
<revised>September 04, 2008: 01</revised>
<package name="media-video/realplayer" auto="yes" arch="*">
<unaffected range="ge"></unaffected>
<vulnerable range="lt"></vulnerable>
RealPlayer is a multimedia player capable of handling multiple
multimedia file formats.
Dyon Balding of Secunia Research reported an unspecified heap-based
buffer overflow in the Shockwave Flash (SWF) frame handling.
<impact type="normal">
By enticing a user to open a specially crafted SWF (Shockwave Flash)
file, a remote attacker could be able to execute arbitrary code with
the privileges of the user running the application.
There is no known workaround at this time.
All RealPlayer users should upgrade to the latest version:
# emerge --sync
# emerge --ask --oneshot --verbose &quot;&gt;=media-video/realplayer-;</code>
<uri link="">CVE-2007-5400</uri>
<metadata tag="submitter" timestamp="Tue, 19 Aug 2008 23:23:04 +0000">
<metadata tag="bugReady" timestamp="Tue, 19 Aug 2008 23:23:18 +0000">