Vulnerabilities > CVE-2006-0323 - Improper Restriction of Operations Within the Bounds of A Memory Buffer vulnerability in Realnetworks products

047910
CVSS 9.3 - CRITICAL
Attack vector
NETWORK
Attack complexity
MEDIUM
Privileges required
NONE
Confidentiality impact
COMPLETE
Integrity impact
COMPLETE
Availability impact
COMPLETE
network
realnetworks
CWE-119
critical
nessus
exploit available

Summary

Buffer overflow in swfformat.dll in multiple RealNetworks products and versions including RealPlayer 10.x, RealOne Player, Rhapsody 3, and Helix Player allows remote attackers to execute arbitrary code via a crafted SWF (Flash) file with (1) a size value that is less than the actual size, or (2) other unspecified manipulations.

Common Attack Pattern Enumeration and Classification (CAPEC)

  • Buffer Overflow via Environment Variables
    This attack pattern involves causing a buffer overflow through manipulation of environment variables. Once the attacker finds that they can modify an environment variable, they may try to overflow associated buffers. This attack leverages implicit trust often placed in environment variables.
  • Overflow Buffers
    Buffer Overflow attacks target improper or missing bounds checking on buffer operations, typically triggered by input injected by an attacker. As a consequence, an attacker is able to write past the boundaries of allocated buffer regions in memory, causing a program crash or potentially redirection of execution as per the attackers' choice.
  • Client-side Injection-induced Buffer Overflow
    This type of attack exploits a buffer overflow vulnerability in targeted client software through injection of malicious content from a custom-built hostile service.
  • Filter Failure through Buffer Overflow
    In this attack, the idea is to cause an active filter to fail by causing an oversized transaction. An attacker may try to feed overly long input strings to the program in an attempt to overwhelm the filter (by causing a buffer overflow) and hoping that the filter does not fail securely (i.e. the user input is let into the system unfiltered).
  • MIME Conversion
    An attacker exploits a weakness in the MIME conversion routine to cause a buffer overflow and gain control over the mail server machine. The MIME system is designed to allow various different information formats to be interpreted and sent via e-mail. Attack points exist when data are converted to MIME compatible format and back.

Exploit-Db

  • descriptionRealNetworks Multiple Products Multiple Buffer Overflow Vulnerabilities. CVE-2006-0323. Dos exploits for multiple platform
    idEDB-ID:27460
    last seen2016-02-03
    modified2006-03-23
    published2006-03-23
    reporterFederico L. Bossi Bonin
    sourcehttps://www.exploit-db.com/download/27460/
    titleRealNetworks Multiple Products Multiple Buffer Overflow Vulnerabilities
  • descriptionRealPlayer. CVE-2006-0323. Dos exploits for multiple platform
    idEDB-ID:1622
    last seen2016-01-31
    modified2006-03-28
    published2006-03-28
    reporterFederico L. Bossi Bonin
    sourcehttps://www.exploit-db.com/download/1622/
    titleRealPlayer <= 10.5 6.0.12.1040-1348 - SWF Buffer Overflow PoC

Nessus

  • NASL familySuSE Local Security Checks
    NASL idSUSE_SA_2006_018.NASL
    descriptionThe remote host is missing the patch for the advisory SUSE-SA:2006:018 (RealPlayer). This update fixes the following security problems in Realplayer: - Specially crafted SWF files could cause a buffer overflow and crash RealPlayer (CVE-2006-0323). - Specially crafted web sites could cause heap overflow and lead to executing arbitrary code (CVE-2005-2922). This was already fixed with the previously released 1.0.6 version, but not announced on request of Real. The advisory for these problems is on this page at Real: http://service.real.com/realplayer/security/03162006_player/en/ SUSE Linux 9.2 up to 10.0 and Novell Linux Desktop 9 are affected by this problem and receive fixed packages. If you are still using Realplayer on SUSE Linux 9.1 or SUSE Linux Desktop 1, we again wish to remind you that the Real player on these products cannot be updated and recommend to deinstall it.
    last seen2019-10-28
    modified2006-03-27
    plugin id21150
    published2006-03-27
    reporterThis script is Copyright (C) 2006-2019 Tenable Network Security, Inc.
    sourcehttps://www.tenable.com/plugins/nessus/21150
    titleSUSE-SA:2006:018: RealPlayer
  • NASL familyFreeBSD Local Security Checks
    NASL idFREEBSD_PKG_25858C37BDAB11DAB7D400123FFE8333.NASL
    descriptionSecunia Advisories Reports : A boundary error when processing SWF files can be exploited to cause a buffer overflow. This may allow execution of arbitrary code on the user
    last seen2020-06-01
    modified2020-06-02
    plugin id21402
    published2006-05-13
    reporterThis script is Copyright (C) 2006-2019 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/21402
    titleFreeBSD : linux-realplayer -- buffer overrun (25858c37-bdab-11da-b7d4-00123ffe8333)
  • NASL familyWindows
    NASL idRHAPSODY_3_1_0_270.NASL
    descriptionAccording to its version number, the installed version of Rhapsody on the remote host suffers from a buffer overflow involving SWF files. To exploit this issue, a remote attacker needs to convince a user to attempt to play a maliciously crafted SWF file using the affected application.
    last seen2020-06-01
    modified2020-06-02
    plugin id21141
    published2006-03-24
    reporterThis script is Copyright (C) 2006-2018 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/21141
    titleRhapsody SWF File Handling Buffer Overflow
  • NASL familyGentoo Local Security Checks
    NASL idGENTOO_GLSA-200603-24.NASL
    descriptionThe remote host is affected by the vulnerability described in GLSA-200603-24 (RealPlayer: Buffer overflow vulnerability) RealPlayer is vulnerable to a buffer overflow when processing malicious SWF files. Impact : By enticing a user to open a specially crafted SWF file an attacker could execute arbitrary code with the permissions of the user running the application. Workaround : There is no known workaround at this time.
    last seen2020-06-01
    modified2020-06-02
    plugin id21148
    published2006-03-27
    reporterThis script is Copyright (C) 2006-2019 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/21148
    titleGLSA-200603-24 : RealPlayer: Buffer overflow vulnerability
  • NASL familyWindows
    NASL idREALPLAYER_6_0_12_1483.NASL
    descriptionAccording to its build number, the installed version of RealPlayer / RealOne Player / RealPlayer Enterprise on the remote Windows host suffers from one or more buffer overflows involving maliciously- crafted SWF and MBC files as well as web pages. In addition, it also may be affected by a local privilege escalation issue.
    last seen2020-06-01
    modified2020-06-02
    plugin id21140
    published2006-03-24
    reporterThis script is Copyright (C) 2006-2018 Tenable Network Security, Inc.
    sourcehttps://www.tenable.com/plugins/nessus/21140
    titleRealPlayer for Windows < Build 6.0.12.1483 Multiple Vulnerabilities
  • NASL familyRed Hat Local Security Checks
    NASL idREDHAT-RHSA-2006-0257.NASL
    descriptionAn updated RealPlayer package that fixes a buffer overflow bug is now available for Red Hat Enterprise Linux Extras 3 and 4. This update has been rated as having critical security impact by the Red Hat Security Response Team. RealPlayer is a media player that provides media playback locally and via streaming. A buffer overflow bug was discovered in the way RealPlayer processes Flash Media (.swf) files. It is possible for a malformed Flash Media file to execute arbitrary code as the user running RealPlayer. The Common Vulnerabilities and Exposures project assigned the name CVE-2006-0323 to this issue. All users of RealPlayer are advised to upgrade to this updated package, which contains RealPlayer version 10.0.7 and is not vulnerable to this issue.
    last seen2020-06-01
    modified2020-06-02
    plugin id63831
    published2013-01-24
    reporterThis script is Copyright (C) 2013-2019 Tenable Network Security, Inc.
    sourcehttps://www.tenable.com/plugins/nessus/63831
    titleRHEL 3 / 4 : RealPlayer (RHSA-2006:0257)

Packetstorm

data sourcehttps://packetstormsecurity.com/files/download/45093/realplayer-swf-PoC.pl.txt
idPACKETSTORM:45093
last seen2016-12-05
published2006-04-01
reporterFederico L. Bossi Bonin
sourcehttps://packetstormsecurity.com/files/45093/realplayer-swf-PoC.pl.txt.html
titlerealplayer-swf-PoC.pl.txt

Redhat

advisories
rhsa
idRHSA-2006:0257

Saint

bid17202
descriptionRealPlayer invalid chunk header heap overflow
idmisc_realplayer
osvdb24062
titlerealplayer_chunk_header
typeclient

Seebug

  • bulletinFamilyexploit
    descriptionNo description provided by source.
    idSSV:15954
    last seen2017-11-19
    modified2006-03-28
    published2006-03-28
    reporterRoot
    sourcehttps://www.seebug.org/vuldb/ssvid-15954
    titleRealPlayer &lt;= 10.5 (6.0.12.1040-1348) SWF Buffer Overflow PoC
  • bulletinFamilyexploit
    descriptionNo description provided by source.
    idSSV:81069
    last seen2017-11-19
    modified2014-07-01
    published2014-07-01
    reporterRoot
    sourcehttps://www.seebug.org/vuldb/ssvid-81069
    titleRealNetworks Multiple Products Multiple Buffer Overflow Vulnerabilities
  • bulletinFamilyexploit
    descriptionNo description provided by source.
    idSSV:7738
    last seen2017-11-19
    modified2007-12-26
    published2007-12-26
    reporterRoot
    sourcehttps://www.seebug.org/vuldb/ssvid-7738
    titleRealPlayer 10.5 (6.0.12.1040-1348) SWF Buffer Overflow PoC
  • bulletinFamilyexploit
    descriptionNo description provided by source.
    idSSV:63442
    last seen2017-11-19
    modified2014-07-01
    published2014-07-01
    reporterRoot
    sourcehttps://www.seebug.org/vuldb/ssvid-63442
    titleRealPlayer <= 10.5 (6.0.12.1040-1348) - SWF Buffer Overflow PoC