RealNetworks RealPlayer RTSP SETUP Request Remote Code Execution VulnerabilityZDI-12-051: March 22nd, 2012
TippingPoint™ IPS Customer ProtectionTippingPoint IPS customers are protected against this vulnerability by Digital Vaccine protection filter ID 12165. For further product information on the TippingPoint IPS:
This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of RealNetworks Real Player. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.
The specific flaw exists due to the application mishandling an error that occurs when parsing an RTSP SETUP request. When an error occurs, the application will free a pointer to a linked list due to the stream being closed. Following this, the application will then attempt to access the freed element whilst traversing the list. This can lead to a use-after-free condition and can lead to code execution under the context of the application.
Vendor ResponseRealNetworks has issued an update to correct this vulnerability. More details can be found at:
2011-08-12 - Vulnerability reported to vendor
2012-03-22 - Coordinated public release of advisory
CreditThis vulnerability was discovered by: