lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Message-ID: <000301c51f19$bb1e5d60$1c01010a@Nicky> Date: Wed, 2 Mar 2005 11:19:41 -0000 From: "Mark Litchfield" <mark@...software.com> To: <bugtraq@...urityfocus.com>, <vulnwatch@...nwatch.org> Subject: RealOne Player / Real .WAV Heap Overflow File Format Vulnerability Mark Litchfield of NGSSoftware has discovered a high risk Heap Overflow vulnerability in the .WAV file format when being opened by either of the following products: Windows: RealPlayer 10.5 (6.0.12.1056 and below) RealPlayer 10 RealOne Player V2 RealOne Player V1 RealPlayer 8 RealPlayer Enterprise Linux: RealPlayer 10 (10.0.0.2 and below) Helix Player This issue has been resolved in the latest version as detailed at : http://service.real.com/realplayer/security/ It can be downloaded from: http://service.real.com/help/faq/security/050224_player Or alternatively select Tools / Check For Update from within the media player. NGSSoftware are going to withhold details of this flaw for three months. Full details will be published on the 1st of June 2005. This three month window will allow users of the above Real products the time needed to apply the patch before the details are released to the general public. This reflects NGSSoftware's approach to responsible disclosure. NGSSoftware Insight Security Research http://www.ngssoftware.com http://www.databasesecurity.com/ +44(0)208 401 0070
Powered by blists - more mailing lists