[<prev] [next>] [day] [month] [year] [list]
Message-ID: <20041006100802.2305E15F556@mail.ngssoftware.com>
Date: Wed, 6 Oct 2004 11:26:21 +0100
From: "NGSSoftware Insight Security Research" <nisr@...tgenss.com>
To: <bugtraq@...urityfocus.com>, <ntbugtraq@...tserv.ntbugtraq.com>,
<vulnwatch@...nwatch.org>
Subject: Patch available for multiple high risk vulnerabilities in RealPlayer
John Heasman of NGSSoftware has discovered multiple high risk
vulnerabilities in RealPlayer. Versions affected include
RealPlayer 10.5 (6.0.12.1040)
RealPlayer 10.5 Beta (6.0.12.1016)
RealPlayer 10
RealOne Player v1, v2
RealPlayer 8
RealPlayer Enterprise
The flaws, that include remotely exploitable buffer overflows and file
access issues, have been fixed by Real. The patch can be downloaded from
http://service.real.com/help/faq/security/040928_player/EN/
This patch fixes NGSS BUGID 145, 146, 147 and 148 from the Vendor
Notification Alerts - http://www.nextgenss.com/vna.htm
NGSSoftware are going to withhold details about these flaws for three
months. Full details will be published on the 6th of January 2005. This
three month window will allow users of RealPlayer the time needed to apply
the patch before the details are released to the general public. This
reflects NGSSoftware's new approach to responsible disclosure.
NGSSoftware Insight Security Research
http://www.databasesecurity.com/
http://www.nextgenss.com/
+44(0)208 401 0070
Powered by blists - more mailing lists