Vulnerabilities > CVE-2011-4259 - Numeric Errors vulnerability in Realnetworks Realplayer

047910
CVSS 9.3 - CRITICAL
Attack vector
NETWORK
Attack complexity
MEDIUM
Privileges required
NONE
Confidentiality impact
COMPLETE
Integrity impact
COMPLETE
Availability impact
COMPLETE
network
realnetworks
CWE-189
critical
nessus

Summary

Integer underflow in RealNetworks RealPlayer before 15.0.0 allows remote attackers to execute arbitrary code via a crafted width value in an MPG file.

Common Weakness Enumeration (CWE)

Nessus

NASL familyWindows
NASL idREALPLAYER_15_0_0_198.NASL
descriptionAccording to its build number, the installed version of RealPlayer on the remote Windows host is earlier than 15.0.0. As such, it is affected by multiple vulnerabilities : - A head-based buffer overflow exists in the
last seen2020-06-01
modified2020-06-02
plugin id57025
published2011-12-06
reporterThis script is Copyright (C) 2011-2018 Tenable Network Security, Inc.
sourcehttps://www.tenable.com/plugins/nessus/57025
titleRealPlayer for Windows < 15.0.0 Multiple Vulnerabilities
code
#
# (C) Tenable Network Security, Inc.
#

include('compat.inc');

if (description)
{
  script_id(57025);
  script_version("1.14");
  script_cvs_date("Date: 2018/11/15 20:50:28");

  script_cve_id(
    "CVE-2011-4244",
    "CVE-2011-4245",
    "CVE-2011-4246",
    "CVE-2011-4247",
    "CVE-2011-4248",
    "CVE-2011-4249",
    "CVE-2011-4250",
    "CVE-2011-4251",
    "CVE-2011-4252",
    "CVE-2011-4253",
    "CVE-2011-4254",
    "CVE-2011-4255",
    "CVE-2011-4256",
    "CVE-2011-4257",
    "CVE-2011-4258",
    "CVE-2011-4259",
    "CVE-2011-4260",
    "CVE-2011-4261",
    "CVE-2011-4262"
  );
  script_bugtraq_id(50741);

  script_name(english:"RealPlayer for Windows < 15.0.0 Multiple Vulnerabilities");
  script_summary(english:"Checks RealPlayer build number.");

  script_set_attribute(attribute:"synopsis", value:
"A multimedia application on the remote Windows host is affected by
multiple vulnerabilities.");

  script_set_attribute(attribute:"description", value:
"According to its build number, the installed version of RealPlayer on
the remote Windows host is earlier than 15.0.0.  As such, it is
affected by multiple vulnerabilities :

  - A head-based buffer overflow exists in the 'RealVideo'
    renderer. (CVE-2011-4244)

  - Memory corruption errors exist in the 'RealVideo'
    renderer and the 'AAC' codec. (CVE-2011-4245,
    CVE-2011-4246)

  - Remote code execution is possible due to errors related
    to 'QCELP' parsing. (CVE-2011-4247)

  - Remote code execution is possible due to errors related
    to 'AAC' file parsing. (CVE-2011-4248)

  - Remote code execution is possible due to errors related
    to improper handling of indexes in 'RV30' encoded files.
    (CVE-2011-4249)

  - Remote code execution is possible due to errors related
    to 'ATRC' file parsing. (CVE-2011-4250)

  - Remote code execution is possible due to errors related
    to 'RealAudio' 'Sample Size' parsing. (CVE-2011-4251)

  - Remote code execution is possible due to errors related
    to 'RV10' decoding. (CVE-2011-4252)

  - Remote code execution is possible due to errors related
    to 'RV20' decoding. (CVE-2011-4253) 

  - Remote code execution is possible due to errors related
    to 'RTSP' 'SETUP' requests (CVE-2011-4254)

  - Remote code execution is possible due to errors related
    to improper handling of invalid codec names. 
    (CVE-2011-4255)

  - Remote code execution is possible due to errors related
    to uninitialized indexes in 'RV30' files. 
    (CVE-2011-4256)

  - Remote code execution is possible due to errors related
    to 'Cook' codec channel parsing. (CVE-2011-4257)

  - Remote code execution is possible due to errors related
    to 'IVR MLTI' chunk length parsing. (CVE-2011-4258)

  - An integer underflow error exists related to 'MPG'
    width handling. (CVE-2011-4259)

  - Remote code execution is possible due to errors related
    to improper handling of malformed 'MP4' headers and 
    parsing of 'MP4' files in general.
    (CVE-2011-4260, CVE-2011-4262)

  - A heap corruption error exists related to improper
    handling of 'MP4' video dimensions. (CVE-2011-4261)");

  script_set_attribute(attribute:"see_also", value:"https://www.zerodayinitiative.com/advisories/ZDI-11-331/");
  script_set_attribute(attribute:"see_also", value:"https://www.zerodayinitiative.com/advisories/ZDI-11-332/");
  script_set_attribute(attribute:"see_also", value:"https://www.zerodayinitiative.com/advisories/ZDI-11-333/");
  script_set_attribute(attribute:"see_also", value:"https://www.zerodayinitiative.com/advisories/ZDI-11-334/");
  script_set_attribute(attribute:"see_also", value:"https://www.zerodayinitiative.com/advisories/ZDI-11-335/");
  script_set_attribute(attribute:"see_also", value:"https://www.zerodayinitiative.com/advisories/ZDI-11-336/");
  script_set_attribute(attribute:"see_also", value:"https://www.zerodayinitiative.com/advisories/ZDI-11-337/");
  script_set_attribute(attribute:"see_also", value:"https://www.zerodayinitiative.com/advisories/ZDI-11-338/");
  script_set_attribute(attribute:"see_also", value:"https://www.zerodayinitiative.com/advisories/ZDI-12-046/");
  script_set_attribute(attribute:"see_also", value:"https://www.zerodayinitiative.com/advisories/ZDI-12-050/");
  script_set_attribute(attribute:"see_also", value:"https://www.zerodayinitiative.com/advisories/ZDI-12-051/");
  script_set_attribute(attribute:"see_also", value:"https://www.zerodayinitiative.com/advisories/ZDI-12-053/");
  script_set_attribute(attribute:"see_also", value:"https://www.zerodayinitiative.com/advisories/ZDI-12-085/");
  script_set_attribute(attribute:"see_also", value:"https://www.zerodayinitiative.com/advisories/ZDI-12-087/");
  script_set_attribute(attribute:"see_also", value:"https://www.zerodayinitiative.com/advisories/ZDI-12-092/");
  script_set_attribute(attribute:"see_also", value:"https://seclists.org/fulldisclosure/2012/Jun/73");
  script_set_attribute(attribute:"see_also", value:"https://seclists.org/fulldisclosure/2012/Jun/75");
  script_set_attribute(attribute:"see_also", value:"https://www.securityfocus.com/archive/1/523067/30/0/threaded");
  script_set_attribute(attribute:"see_also", value:"http://service.real.com/realplayer/security/11182011_player/en/");
  script_set_attribute(attribute:"solution", value:"Upgrade to RealPlayer 15.0.0 or later.");
  script_set_cvss_base_vector("CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C");
  script_set_cvss_temporal_vector("CVSS2#E:F/RL:OF/RC:C");
  script_set_attribute(attribute:"exploitability_ease", value:"Exploits are available");
  script_set_attribute(attribute:"exploit_available", value:"true");
  script_set_attribute(attribute:"exploit_framework_core", value:"true");
  
  script_set_attribute(attribute:"vuln_publication_date", value:"2011/11/21");
  script_set_attribute(attribute:"patch_publication_date", value:"2011/11/21");
  script_set_attribute(attribute:"plugin_publication_date", value:"2011/12/06");

  script_set_attribute(attribute:"cpe", value:"cpe:/a:realnetworks:realplayer");
  script_set_attribute(attribute:"plugin_type", value:"local");
  script_end_attributes();

  script_category(ACT_GATHER_INFO);
  script_family(english:"Windows");
  
  script_copyright(english:"This script is Copyright (C) 2011-2018 Tenable Network Security, Inc.");

  script_dependencies("realplayer_detect.nasl");
  script_require_keys("SMB/RealPlayer/Product", "SMB/RealPlayer/Build");

  exit(0);
}

include("global_settings.inc");
include("misc_func.inc");

prod = get_kb_item_or_exit("SMB/RealPlayer/Product");
build = get_kb_item_or_exit("SMB/RealPlayer/Build");
path = get_kb_item("SMB/RealPlayer/Path");
version = get_kb_item("SMB/RealPlayer/Version");

vuln = FALSE;
if ("RealPlayer" == prod)
{
  if (ver_compare(ver:build, fix:'15.0.0.0') == -1) vuln = TRUE;
}
else if ("RealPlayer SP" == prod)
{
  # Check for all versions of RealPlayer SP up to and including 12.0.0.879 (version 1.1.5)
  if (build =~ '^12\\.0\\.0\\..*' && ver_compare(ver:build, fix:'12.0.0.879') <= 0) vuln = TRUE;
}
else exit(0, 'Neither RealPlayer nor RealPlayer SP was detected on the remote host.');

if (vuln)
{
  if (report_verbosity > 0)
  {
    report = 
      '\n  Product           : ' + prod +
      '\n  Path              : ' + path +
      '\n  Installed version : ' + version + 
      '\n  Installed build   : ' + build +
      '\n  Fixed version     : RealPlayer 15.0\n';
    security_hole(port:get_kb_item("SMB/transport"), extra:report);
  }
  else security_hole(get_kb_item("SMB/transport"));
  exit(0);
}
else exit(0, 'The '+prod+' build '+build+' install on the host is not affected.');