Description: Two vulnerabilities have been reported in various RealNetworks products, which can be exploited by malicious people to compromise a user's system. 1) A boundary error within the processing of WAV files can be exploited to cause a buffer overflow via a specially crafted WAV file. 2) A boundary error within the processing of SMIL files can be exploited to cause a stack-based buffer overflow via a specially crafted SMIL file. Successful exploitation of the vulnerabilities allows execution of arbitrary code. Solution: Apply patches. Linux Players: RealPlayer 10: http://www.real.com/linux Original Advisory: RealNetworks: http://service.real.com/help/faq/security/050224_player/EN/ iDEFENSE: http://www.idefense.com/applicat...?id=209&type=vulnerabilities
Realplayer is already masked due to multiple security problems.
Fixed by unmasking/release of 10.0.3