-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

===========================================================================
                         AUSCERT Security Bulletin

                               ASB-2011.0106
              RealPlayer patches 19 security vulnerabilities
                             24 November 2011

===========================================================================

        AusCERT Security Bulletin Summary
        ---------------------------------

Product:              RealPlayer
                      Mac RealPlayer
Operating System:     Windows
                      Mac OS X
Impact/Access:        Execute Arbitrary Code/Commands -- Remote with User Interaction
Resolution:           Patch/Upgrade
CVE Names:            CVE-2011-4262 CVE-2011-4261 CVE-2011-4260
                      CVE-2011-4259 CVE-2011-4258 CVE-2011-4257
                      CVE-2011-4256 CVE-2011-4255 CVE-2011-4254
                      CVE-2011-4253 CVE-2011-4252 CVE-2011-4251
                      CVE-2011-4250 CVE-2011-4249 CVE-2011-4248
                      CVE-2011-4247 CVE-2011-4246 CVE-2011-4245
                      CVE-2011-4244  
Member content until: Saturday, December 24 2011

OVERVIEW

        A new version of RealPlayer has been released correcting 19
        vulnerabilities for Mac and Windows. [1]


IMPACT

        The 19 vulnerabilities allow remote code execution as the currently
        logged in user. The 19 vulnerabilities are: [1]
        
         - CVE-2011-4244: RealPlayer RealVideo Renderer Heap Buffer Overflow Vulnerability
         - CVE-2011-4245: RealPlayer RealVideo Renderer Memory Corruption Vulnerability
         - CVE-2011-4246: RealPlayer AAC Codec Memory Corruption Vulnerability
         - CVE-2011-4247: Realplayer QCELP Stream Parsing Remote Code Execution Vulnerability
         - CVE-2011-4248: RealPlayer Malformed AAC File Parsing Remote Code Execution Vulnerability
         - CVE-2011-4249: RealPlayer RV30 Sample Arbitrary Index Remote Code Execution Vulnerability
         - CVE-2011-4250: RealPlayer ATRC Codec Parsing Remote Code Execution Vulnerability
         - CVE-2011-4251: RealPlayer RealAudio Sample Size Parsing Remote Code Execution Vulnerability
         - CVE-2011-4252: RealPlayer RV10 Sample Height Parsing Remote Code Execution Vulnerability
         - CVE-2011-4253: RealPlayer RV20 Decoding Remote Code Execution Vulnerability
         - CVE-2011-4254: RealPlayer RTSP SETUP Request Remote Code Execution Vulnerability
         - CVE-2011-4255: RealPlayer Invalid Codec Name Remote Code Execution Vulnerability
         - CVE-2011-4256: RealPlayer Invalid Codec Name Remote Code Execution Vulnerability
         - CVE-2011-4257: RealPlayer Cook Codec Channel Parsing Remote Code Execution Vulnerability
         - CVE-2011-4258: RealPlayer IVR MLTI Chunk Length Parsing Remote Code Execution Vulnerability
         - CVE-2011-4259: RealPlayer MPG Width Integer Underflow Remote Code Execution Vulnerability
         - CVE-2011-4260: RealPlayer MP4 Malformed Header Remote Code Execution Vulnerability
         - CVE-2011-4261: RealPlayer MP4 Video Dimensions Heap Corruption Remote Code Execution Vulnerability
         - CVE-2011-4262: RealPlayer MP4 File Parsing Remote Code Execution Vulnerability


MITIGATION

        RealPlayer had released RealPlayer version 15.0 for Windows XP, Vista and 7 as well as
        RealPlayer version 12.0.0.1703 for Mac OS X 10.3 to 10.6. [1]


REFERENCES

        [1] RealNetworks, Inc. Releases Update to Address Security
            Vulnerabilities.
            http://service.real.com/realplayer/security/11182011_player/en/

AusCERT has made every effort to ensure that the information contained
in this document is accurate.  However, the decision to use the information
described is the responsibility of each user or organisation. The decision to
follow or act on information or advice contained in this security bulletin is
the responsibility of each user or organisation, and should be considered in
accordance with your organisation's site policies and procedures. AusCERT
takes no responsibility for consequences which may arise from following or
acting on information or advice contained in this security bulletin.

===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile:      (07) 3365 7031
Telephone:      (07) 3365 4417 (International: +61 7 3365 4417)
                AusCERT personnel answer during Queensland business hours 
                which are GMT+10:00 (AEST).
                On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: http://www.auscert.org.au/render.html?it=1967
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=z71c
-----END PGP SIGNATURE-----