Vulnerabilities > CVE-2003-0141 - Unspecified vulnerability in Realnetworks products
Attack vector
UNKNOWN Attack complexity
UNKNOWN Privileges required
UNKNOWN Confidentiality impact
UNKNOWN Integrity impact
UNKNOWN Availability impact
UNKNOWN realnetworks
nessus
Summary
The PNG deflate algorithm in RealOne Player 6.0.11.x and earlier, RealPlayer 8/RealPlayer Plus 8 6.0.9.584, and other versions allows remote attackers to corrupt the heap and overwrite arbitrary memory via a PNG graphic file format containing compressed data using fixed trees that contain the length values 286-287, which are treated as a very large length.
Vulnerable Configurations
Nessus
NASL family | Windows |
NASL id | REALPLAYER_PNG_HEAP_CORRUPTION.NASL |
description | According to its build number, the installed version of RealPlayer / RealOne Player / RealPlayer Enterprise for Windows has a flaw in the remote version that may allow an attacker to execute arbitrary code on the remote host, with the privileges of the user running RealPlayer. To do so, an attacker would need to send a corrupted PNG file to a remote user and have him open it using RealPlayer. |
last seen | 2020-06-01 |
modified | 2020-06-02 |
plugin id | 11496 |
published | 2003-03-28 |
reporter | This script is Copyright (C) 2003-2018 Tenable Network Security, Inc. |
source | https://www.tenable.com/plugins/nessus/11496 |
title | RealPlayer PNG Deflate Algorithm Heap Corruption Arbitrary Code Execution |
code |
|
References
- http://archives.neohapsis.com/archives/vulnwatch/2003-q1/0156.html
- http://archives.neohapsis.com/archives/vulnwatch/2003-q1/0156.html
- http://marc.info/?l=bugtraq&m=104887465427579&w=2
- http://marc.info/?l=bugtraq&m=104887465427579&w=2
- http://www.coresecurity.com/common/showdoc.php?idx=311&idxseccion=10
- http://www.coresecurity.com/common/showdoc.php?idx=311&idxseccion=10
- http://www.kb.cert.org/vuls/id/705761
- http://www.kb.cert.org/vuls/id/705761
- http://www.securityfocus.com/bid/7177
- http://www.securityfocus.com/bid/7177