When you purchase through links on our site, we may earn an affiliate commission. Here’s how it works.

Plug-in flaw leaves RealPlayer users open to attack

RealNetworks has issued a patch for a security flaw in one of its plug-ins that could let an attacker gain control of computers running any of several versions of the company's popular media player software.

The problem involves a buffer overflow that affects the R3T media plug-in. For people who download the plug-in and use RealPlayer 8, RealOne Player, RealOne Player v2 for Windows, RealPlayer 10 Beta (English only) or RealPlayer Enterprise, their computer can be overpowered by an attacker, who can then insert surreptitious code and use it to execute other actions.

RealPlayer 10 Gold is not affected, the company said, because it removes the plug-in during installation.

RealNetworks has issued a patch for a security flaw in one of its plug-ins that could let an attacker gain control of computers running any of several versions of the company's popular media player software.

News source: Explanation on how to fix this issue can be found here

Report a problem with article
Next Article

Vulnerability in Internet Explorer ITS Protocol Handler

Previous Article

PHP 4.3.6 RC3

Join the conversation!

Login or Sign Up to read and post a comment.

-1 Comments - Add comment