Skip to navigation

Security Advisory Critical: HelixPlayer security update

Advisory: RHSA-2010:0094-1
Type: Security Advisory
Severity: Critical
Issued on: 2010-02-09
Last updated on: 2010-02-09
Affected Products: Red Hat Desktop (v. 4)
Red Hat Enterprise Linux AS (v. 4)
Red Hat Enterprise Linux AS (v. 4.8.z)
Red Hat Enterprise Linux ES (v. 4)
Red Hat Enterprise Linux ES (v. 4.8.z)
Red Hat Enterprise Linux WS (v. 4)
CVEs (cve.mitre.org): CVE-2009-4242
CVE-2009-4245
CVE-2009-4247
CVE-2009-4248
CVE-2009-4257
CVE-2010-0416
CVE-2010-0417

Details

An updated HelixPlayer package that fixes several security issues is now
available for Red Hat Enterprise Linux 4.

This update has been rated as having critical security impact by the Red
Hat Security Response Team.

HelixPlayer is a media player.

Multiple buffer and integer overflow flaws were found in the way
HelixPlayer processed Graphics Interchange Format (GIF) files. An attacker
could create a specially-crafted GIF file which would cause HelixPlayer to
crash or, potentially, execute arbitrary code when opened. (CVE-2009-4242,
CVE-2009-4245)

A buffer overflow flaw was found in the way HelixPlayer processed
Synchronized Multimedia Integration Language (SMIL) files. An attacker
could create a specially-crafted SMIL file which would cause HelixPlayer to
crash or, potentially, execute arbitrary code when opened. (CVE-2009-4257)

A buffer overflow flaw was found in the way HelixPlayer handled the Real
Time Streaming Protocol (RTSP) SET_PARAMETER directive. A malicious RTSP
server could use this flaw to crash HelixPlayer or, potentially, execute
arbitrary code. (CVE-2009-4248)

Multiple buffer overflow flaws were discovered in the way HelixPlayer
handled RuleBook structures in media files and RTSP streams.
Specially-crafted input could cause HelixPlayer to crash or, potentially,
execute arbitrary code. (CVE-2009-4247, CVE-2010-0417)

A buffer overflow flaw was found in the way HelixPlayer performed URL
un-escaping. A specially-crafted URL string could cause HelixPlayer to
crash or, potentially, execute arbitrary code. (CVE-2010-0416)

All HelixPlayer users are advised to upgrade to this updated package,
which contains backported patches to resolve these issues. All running
instances of HelixPlayer must be restarted for this update to take effect.


Solution

Before applying this update, make sure that all previously-released
errata relevant to your system have been applied.

This update is available via Red Hat Network. Details on how to use
the Red Hat Network to apply this update are available at
http://kbase.redhat.com/faq/docs/DOC-11259

Updated packages

Red Hat Desktop (v. 4)

SRPMS:
HelixPlayer-1.0.6-1.el4_8.1.src.rpm     MD5: 675b5516337bed83a581dba8cfcf1492
 
IA-32:
HelixPlayer-1.0.6-1.el4_8.1.i386.rpm     MD5: ba63595f16702477483428e01416cc7d
 
x86_64:
HelixPlayer-1.0.6-1.el4_8.1.i386.rpm     MD5: ba63595f16702477483428e01416cc7d
 
Red Hat Enterprise Linux AS (v. 4)

SRPMS:
HelixPlayer-1.0.6-1.el4_8.1.src.rpm     MD5: 675b5516337bed83a581dba8cfcf1492
 
IA-32:
HelixPlayer-1.0.6-1.el4_8.1.i386.rpm     MD5: ba63595f16702477483428e01416cc7d
 
PPC:
HelixPlayer-1.0.6-1.el4_8.1.ppc.rpm     MD5: 8b2ff926b0538916c180dfde774f1d94
 
x86_64:
HelixPlayer-1.0.6-1.el4_8.1.i386.rpm     MD5: ba63595f16702477483428e01416cc7d
 
Red Hat Enterprise Linux AS (v. 4.8.z)

SRPMS:
HelixPlayer-1.0.6-1.el4_8.1.src.rpm     MD5: 675b5516337bed83a581dba8cfcf1492
 
IA-32:
HelixPlayer-1.0.6-1.el4_8.1.i386.rpm     MD5: ba63595f16702477483428e01416cc7d
 
PPC:
HelixPlayer-1.0.6-1.el4_8.1.ppc.rpm     MD5: 8b2ff926b0538916c180dfde774f1d94
 
x86_64:
HelixPlayer-1.0.6-1.el4_8.1.i386.rpm     MD5: ba63595f16702477483428e01416cc7d
 
Red Hat Enterprise Linux ES (v. 4)

SRPMS:
HelixPlayer-1.0.6-1.el4_8.1.src.rpm     MD5: 675b5516337bed83a581dba8cfcf1492
 
IA-32:
HelixPlayer-1.0.6-1.el4_8.1.i386.rpm     MD5: ba63595f16702477483428e01416cc7d
 
x86_64:
HelixPlayer-1.0.6-1.el4_8.1.i386.rpm     MD5: ba63595f16702477483428e01416cc7d
 
Red Hat Enterprise Linux ES (v. 4.8.z)

SRPMS:
HelixPlayer-1.0.6-1.el4_8.1.src.rpm     MD5: 675b5516337bed83a581dba8cfcf1492
 
IA-32:
HelixPlayer-1.0.6-1.el4_8.1.i386.rpm     MD5: ba63595f16702477483428e01416cc7d
 
x86_64:
HelixPlayer-1.0.6-1.el4_8.1.i386.rpm     MD5: ba63595f16702477483428e01416cc7d
 
Red Hat Enterprise Linux WS (v. 4)

SRPMS:
HelixPlayer-1.0.6-1.el4_8.1.src.rpm     MD5: 675b5516337bed83a581dba8cfcf1492
 
IA-32:
HelixPlayer-1.0.6-1.el4_8.1.i386.rpm     MD5: ba63595f16702477483428e01416cc7d
 
x86_64:
HelixPlayer-1.0.6-1.el4_8.1.i386.rpm     MD5: ba63595f16702477483428e01416cc7d
 
(The unlinked packages above are only available from the Red Hat Network)

Bugs fixed (see bugzilla for more information)

561309 - CVE-2009-4257 HelixPlayer / RealPlayer: SMIL getAtom heap buffer overflow
561338 - CVE-2009-4247 HelixPlayer / RealPlayer: RTSP client ASM RuleBook stack buffer overflow
561361 - CVE-2009-4248 HelixPlayer / RealPlayer: RTSP SET_PARAMETER buffer overflow
561436 - CVE-2009-4242 HelixPlayer / RealPlayer: GIF file heap overflow
561441 - CVE-2009-4245 HelixPlayer / RealPlayer: compressed GIF heap overflow
561856 - CVE-2010-0416 HelixPlayer / RealPlayer: URL unescape buffer overflow
561860 - CVE-2010-0417 HelixPlayer / RealPlayer: rule book handling heap corruption


References



These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from:
https://www.redhat.com/security/team/key/#package

The Red Hat security contact is secalert@redhat.com. More contact details at http://www.redhat.com/security/team/contact/