{"vuid":"VU#461187","idnumber":"461187","name":"RealPlayer file deletion overflow vulnerability","keywords":["RealNetworks","RealPlayer","rjbdll.dll module","stack-based buffer overflow","library file deletion","media library files"],"overview":"RealPlayer contains a buffer overflow vulnerability that may allow an attacker to execute code on a vulnerable system.","clean_desc":"RealPlayer media player that is distributed by RealNetworks. RealPlayer supports streaming and local media. Per the Zero Day Initiative advisory ZDI-08-046: The specific flaw exists in RealPlayer's rjbdll.dll module when handling the deletion of media library files. An attacker could exploit this vulnerability using an ActiveX control {FDC7A535-4070-4B92-A0EA-D9994BCC0DC5} to import a vulnerable file into the user's media library. Upon deletion of this file, an exploitable stack based buffer overflow can be triggered.","impact":"By convincing a user to visit a website, a remote attacker may be able to execute arbitrary code.","resolution":"Upgrade\nRealPlayer updates for multiple operating systems are available on the RealNetworks support site. Users are encouraged to apply updates as soon as possible.","workarounds":"Disable Active X control Setting the kill bit for the {FDC7A535-4070-4B92-A0EA-D9994BCC0DC5} CLSID may prevent this vulnerability from being exploited by a remote attacker. See US-Cert Vulnerability Note VU#871673 for more information on how to disable this control.","sysaffected":"","thanks":"Thanks to ZDI for information that was used in this report.","author":"This document was written by Ryan Giobbi.","public":["http://www.zerodayinitiative.com/advisories/ZDI-08-046/","http://service.real.com/realplayer/security/07252008_player/en/","http://www.kb.cert.org/vuls/id/871673"],"cveids":[""],"certadvisory":"","uscerttechnicalalert":null,"datecreated":"2008-07-28T14:35:40Z","publicdate":"2008-07-25T00:00:00Z","datefirstpublished":"2008-07-28T19:50:08Z","dateupdated":"2008-07-28T19:54:05Z","revision":3,"vrda_d1_directreport":"0","vrda_d1_population":"4","vrda_d1_impact":"4","cam_widelyknown":"16","cam_exploitation":"0","cam_internetinfrastructure":"4","cam_population":"20","cam_impact":"15","cam_easeofexploitation":"15","cam_attackeraccessrequired":"15","cam_scorecurrent":"25.3125","cam_scorecurrentwidelyknown":"30.375","cam_scorecurrentwidelyknownexploited":"55.6875","ipprotocol":"","cvss_accessvector":"","cvss_accesscomplexity":"","cvss_authentication":null,"cvss_confidentialityimpact":"","cvss_integrityimpact":"","cvss_availabilityimpact":"","cvss_exploitablity":null,"cvss_remediationlevel":"","cvss_reportconfidence":"","cvss_collateraldamagepotential":"","cvss_targetdistribution":"","cvss_securityrequirementscr":"","cvss_securityrequirementsir":"","cvss_securityrequirementsar":"","cvss_basescore":"","cvss_basevector":"","cvss_temporalscore":"","cvss_environmentalscore":"","cvss_environmentalvector":"","metric":25.3125,"vulnote":null}