|Category:||Red Hat Local Security Checks|
|Title:||RedHat Security Advisory RHSA-2005:265|
The remote host is missing updates announced in
RealPlayer is a media player.
A stack based buffer overflow bug was found in RealPlayer's Synchronized
Multimedia Integration Language (SMIL) file processor. An attacker could
create a specially crafted SMIL file which would execute arbitrary code
when opened by a user. The Common Vulnerabilities and Exposures project
(cve.mitre.org) has assigned the name CVE-2005-0455 to this issue.
A buffer overflow bug was found in the way RealPlayer decodes WAV sound
files. An attacker could create a specially crafted WAV file which could
execute arbitrary code when opened by a user. The Common Vulnerabilities
and Exposures project (cve.mitre.org) has assigned the name CVE-2005-0611
to this issue.
All users of RealPlayer are advised to upgrade to this updated package,
which contains RealPlayer version 10.0.3 and is not vulnerable to these issues.
Please note that this update is available via
Red Hat Network. To use Red Hat Network, launch the Red
Hat Update Agent with the following command: up2date
Risk factor : High
Common Vulnerability Exposure (CVE) ID: CVE-2005-0455|
Common Vulnerability Exposure (CVE) ID: CVE-2005-0611
Bugtraq: 20050302 RealOne Player / Real .WAV Heap Overflow File Format Vulnerability (Google Search)
|Copyright||Copyright (c) 2005 E-Soft Inc. http://www.securityspace.com|
|This is only one of 99761 vulnerability tests in our test suite. Find out more about running a complete security audit.|
To run a free test of this vulnerability against your system, register below.