Gentoo Websites Logo
Go to: Gentoo Home Documentation Forums Lists Bugs Planet Store Wiki Get Gentoo!
Bug 79347 - media-video/realplayer remote code execution
Summary: media-video/realplayer remote code execution
Status: RESOLVED DUPLICATE of bug 40469
Alias: None
Product: Gentoo Security
Classification: Unclassified
Component: Vulnerabilities (show other bugs)
Hardware: All Linux
: High normal (vote)
Assignee: Gentoo Security
Depends on:
Reported: 2005-01-24 09:02 UTC by Marco Morales
Modified: 2005-07-17 13:06 UTC (History)
0 users

See Also:
Package list:
Runtime testing required: ---


Note You need to log in before you can comment on or make changes to this bug.
Description Marco Morales 2005-01-24 09:02:52 UTC
SUSE Security Announcement

       Package:                realplayer 8
       Announcement-ID:        SUSE-SA:2005:004
       Date:                   Monday, Jan 24th 2005 16:00 MET
       Affected products:      8.1, 8.2, 9.0, 9.1
                               SUSE Linux Desktop 1.0
       Vulnerability Type:     remote code execution
       Severity (1-10):        8
       SUSE default package:   yes
       Cross References:       none

   Content of this advisory:
       1) security vulnerability discussed:
              - integer overflow
          problem description
       2) solution/workaround
       3) standard appendix (further information)


1) problem description, brief discussion

  RealPlayer is a combined audio and video player for RealMedia formatted
  streaming data. These formats are very common throughout the Internet.

  eEye Security in October 2004 discovered a flaw in the .rm RealMovie
  stream handling routines which allows a remote attacker to exploit an
  integer overflow vulnerability using a special .rm file. This might
  allow a remote attacker to execute code as the user running RealPlayer.

  Reference URLs for this problems are the Real security advisory:

  and the eEye security advisory:

  SUSE Linux includes RealPlayer as both standalone player and as a
  plugin for web browsers like Mozilla and Konqueror.
  This might allow the attacker to just provide a web page or E-Mail
  linking to the special exploit .rm file.

  We cannot fully evaluate the impact of this problem due to lack of
  information and lack of source code to review.

  SUSE Linux versions up to 9.1 and the SUSE Linux Desktop 1.0
  include RealPlayer version 8 and are affected by this problem.

  SUSE Linux 9.2 and the Novell Linux Desktop 9 include RealPlayer
  version 10 and are NOT affected by this problem.

  Real does not offer a fixed version 8 RealPlayer, but suggests
  upgrading RealPlayer to version 10.

  However, upgrading Realplayer is not possible for older SUSE Linux
  products since Realplayer 10 requires newer dynamic library
  versions than the ones to be found in those products.  Also some old
  Real content is not compatible with the RealPlayer version 10.

  For these reasons we cannot offer fixed packages for older SUSE Linux
  based products.

2) solution/workaround

  We suggest one of the following workarounds:

  a) De-install RealPlayer

     Either use YaST to deinstall RealPlayer, or as root do:

     # rpm -e RealPlayer

     You will lose the ability to view Real content.

  b) Remove the RealPlayer plug in

     As root, execute the following commands:

     # rm /usr/lib/browser-plugins/
     # rm /usr/lib/browser-plugins/

     Content can still be viewed by starting "realplay" and opening
     URLs, but automatic exploits via web pages or E-Mails are no longer

Reproducible: Always
Steps to Reproduce:
Comment 1 Carsten Lohrke (RETIRED) gentoo-dev 2005-01-24 09:35:55 UTC
Marco: It is hard masked for ages because of Bug 40469
Comment 2 Thierry Carrez (RETIRED) gentoo-dev 2005-01-25 02:59:40 UTC

*** This bug has been marked as a duplicate of 40469 ***