{"vuid":"VU#974689","idnumber":"974689","name":"RealNetworks Helix Universal Server vulnerable to buffer overflow when sent two simultaneous HTTP requests containing a long string of characters","keywords":["RealNetworks","Helix Universal Server","buffer overflow","HTTP request","long string of characters","NISR20122002"],"overview":"The RealNetworks' Helix Universal Server supports delivery of several different media types over the Internet. Vulnerabilities have been discovered in the way it handles some requests from the network. These vulnerabilities could allow a remote attacker to execute arbitrary code on vulnerable systems.","clean_desc":"Researchers at NGSSoftware have discovered a vulnerability in the way that the Helix Universal Server handles HTTP GET requests for overly long URIs. According to the NGSSoftware advisory: \"By making two HTTP requests (port 80) containing long URI's simultaneously, (in making the first connection, it will appear to hang, by keeping this session open and making another connection and supplying the same request again ), will cause the saved return address to also be overwritten, allowing an attacker to run arbitrary code of their choosing.\" This vulnerability is similar to VU#329561 and VU#485057, which were also discovered by NGSSoftware and published in the same advisory.","impact":"A remote attacker may be able to execute arbitrary code on the vulnerable system. This attacker-supplied code would be run with the privileges of the user running the Helix Server.","resolution":"Apply a patch from the vendor RealNetworks has provided information about patches for the Helix Universal Server at the following location: http://www.service.real.com/help/faq/security/bufferoverrun12192002.html Users are encouraged to review this information and apply the patch.","workarounds":"Workarounds Disable access to the Helix Server via HTTP If patches cannot be applied, limit access to the HTTP service (80/tcp) on the vulnerable systems to trusted systems on the network. Note that this will not prevent internal attackers from exploiting this vulnerability, but can limit exposure. As a general rule, the CERT/CC recommends blocking access to all services that are not explicitly required.","sysaffected":"","thanks":"Thanks to Mark Litchfield of \nNGSSoftware Insight Security Research\n for reporting this vulnerability.","author":"This document was written by Chad R Dougherty.","public":["http://www.real.com/","http://www.service.real.com/help/faq/security/bufferoverrun12192002.html","http://www.nextgenss.com/advisories/realhelix.txt"],"cveids":[""],"certadvisory":"","uscerttechnicalalert":null,"datecreated":"2002-12-20T20:53:35Z","publicdate":"2002-12-20T00:00:00Z","datefirstpublished":"2003-04-17T14:19:30Z","dateupdated":"2003-04-17T18:04:47Z","revision":14,"vrda_d1_directreport":"","vrda_d1_population":"","vrda_d1_impact":"","cam_widelyknown":"15","cam_exploitation":"0","cam_internetinfrastructure":"5","cam_population":"6","cam_impact":"19","cam_easeofexploitation":"10","cam_attackeraccessrequired":"20","cam_scorecurrent":"8.55","cam_scorecurrentwidelyknown":"10.6875","cam_scorecurrentwidelyknownexploited":"19.2375","ipprotocol":"","cvss_accessvector":"","cvss_accesscomplexity":"","cvss_authentication":null,"cvss_confidentialityimpact":"","cvss_integrityimpact":"","cvss_availabilityimpact":"","cvss_exploitablity":null,"cvss_remediationlevel":"","cvss_reportconfidence":"","cvss_collateraldamagepotential":"","cvss_targetdistribution":"","cvss_securityrequirementscr":"","cvss_securityrequirementsir":"","cvss_securityrequirementsar":"","cvss_basescore":"","cvss_basevector":"","cvss_temporalscore":"","cvss_environmentalscore":"","cvss_environmentalvector":"","metric":8.55,"vulnote":null}