RealNetworks RealPlayer mp4fformat rdrf Remote Code Execution VulnerabilityZDI-12-050: March 22nd, 2012
TippingPoint™ IPS Customer ProtectionTippingPoint IPS customers are protected against this vulnerability by Digital Vaccine protection filter ID 12151. For further product information on the TippingPoint IPS:
This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of RealNetworks Realplayer. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.
The specific flaw exists within mp4fformat. The vulnerability resides in adding 1 to a trusted size value being taken out of the file data. The size value is then used in an operator_new call. This can be leveraged when the pointer returned from the operator_new is used in a memcpy as the destination buffer pointer. This vulnerability can result in remote code execution under the context of the user running the application.
Vendor ResponseRealNetworks has issued an update to correct this vulnerability. More details can be found at:
2011-09-08 - Vulnerability reported to vendor
2012-03-22 - Coordinated public release of advisory
CreditThis vulnerability was discovered by: