Advisory Details

December 16th, 2008

RealNetworks Helix Server DataConvertBuffer Heap Overflow Vulnerability

ZDI-08-090
ZDI-CAN-333

CVE ID
CVSS SCORE
AFFECTED VENDORS RealNetworks
AFFECTED PRODUCTS Helix Server
TREND MICRO CUSTOMER PROTECTION Trend Micro TippingPoint IPS customers are protected against this vulnerability by Digital Vaccine protection filter ID ['5863']. For further product information on the TippingPoint IPS: http://www.tippingpoint.com
VULNERABILITY DETAILS

This vulnerability allows attackers to execute arbitrary code on vulnerable installations of RealNetworks Helix Server. Authentication is not required to exploit this vulnerability.

The specific flaw exists while processing malformed base64 encoded data from a SET_PARAMETER command containing the DataConvertBuffer header within an RTSP packet. The service fails to check that the data was properly decoded. The process then uses a faulty return value as a size parameter leading to an exploitable heap based buffer overflow. Exploitation of this vulnerability allows an attacker to execute arbitrary code under the context of the SYSTEM user.

ADDITIONAL DETAILS
DISCLOSURE TIMELINE
  • 2008-05-13 - Vulnerability reported to vendor
  • 2008-12-16 - Coordinated public release of advisory
  • 2021-07-15 - Advisory Updated
CREDIT Anonymous
BACK TO ADVISORIES