RealPlayer security fix is faulty

Thankz Mark! for sending this news

That nemesis of application security, the buffer overrun, has found its way into media players from RealNetworks.

Three similar, though separate, flaws in RealPlayer (and its update RealOne) create a way for crackers to inject hostile code onto Windows boxes of victims induced to run maliciously constructed media files.

In common with most buffer overflow flaws (which are typically attributable to programming errors), hostile code could execute in the security context of the logged-on user/victim.

All three flaws were discovered by NGS Software. It notified RealNetworks of the problem on November 1, and the company followed up with an advisory and security fixes on November 20.

Problem is - the fixes don't work.

Mark Litchfield, of NGS Software, found that patches failed to address the problem.

News source: The Reg

Report a problem with article
Previous Story

Most Insecure OS? Yep, It's Linux

Next Story

America's Army: Operations full install & patches v1.4.0

0 Comments

Commenting is disabled on this article.

There are no comments