Skip to navigation

Security Advisory RealPlayer security update

Advisory: RHSA-2005:363-10
Type: Security Advisory
Severity: Critical
Issued on: 2005-04-20
Last updated on: 2005-04-20
Affected Products: Red Hat Enterprise Linux Extras (v. 4)
CVEs (cve.mitre.org): CVE-2005-0755

Details

An updated RealPlayer package that fixes a buffer overflow issue is now
available.

This update has been rated as having critical security impact by the Red
Hat Security Response Team.

RealPlayer is a media player that provides solid media playback locally
and via streaming. It plays RealAudio, RealVideo, MP3, 3GPP Video,
Flash, SMIL 2.0, JPEG, GIF, PNG, RealPix and RealText and
more.

A buffer overflow bug was found in the way RealPlayer processes RAM files.
An attacker could create a specially crafted RAM file which could execute
arbitrary code when opened by a user. The Common Vulnerabilities and
Exposures project (cve.mitre.org) has assigned the name CAN-2005-0755 to
this issue.

All users of RealPlayer are advised to upgrade to this updated package,
which contains RealPlayer version 10.0.4 and is not vulnerable to this
issue.


Solution

Before applying this update, make sure that all previously-released
errata relevant to your system have been applied. Use Red Hat
Network to download and update your packages. To launch the Red Hat
Update Agent, use the following command:

up2date

For information on how to install packages manually, refer to the
following Web page for the System Administration or Customization
guide specific to your system:

http://www.redhat.com/docs/manuals/enterprise/

Updated packages

Red Hat Enterprise Linux Extras (v. 4)

IA-32:
RealPlayer-10.0.4-0.rc1.1.i386.rpm
File outdated by:  RHSA-2007:0841
    MD5: d7ee50d68f5a9350ac307c04ecbe7539
 
x86_64:
RealPlayer-10.0.4-0.rc1.1.i386.rpm
File outdated by:  RHSA-2007:0841
    MD5: d7ee50d68f5a9350ac307c04ecbe7539
 
(The unlinked packages above are only available from the Red Hat Network)

Bugs fixed (see bugzilla for more information)

153931 - RealPlayer buffer overflow


References



These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from:
https://www.redhat.com/security/team/key/#package

The Red Hat security contact is secalert@redhat.com. More contact details at http://www.redhat.com/security/team/contact/