23 December 2013
Protect yourself against future threats.
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 =========================================================================== AUSCERT Security Bulletin ASB-2013.0140 A vulnerability has been identified in Windows RealPlayer 23 December 2013 =========================================================================== AusCERT Security Bulletin Summary --------------------------------- Product: RealNetworks RealPlayer Operating System: Windows Impact/Access: Execute Arbitrary Code/Commands -- Remote with User Interaction Denial of Service -- Remote with User Interaction Resolution: Patch/Upgrade CVE Names: CVE-2013-6877 Member content until: Wednesday, January 22 2014 OVERVIEW A vulnerability has been identified in Windows RealPlayer prior to version 188.8.131.52.  IMPACT The vendor has provided the following description regarding these issues: "CVE-2013-6877 - RealPlayer - Stack buffer overflow in Player when handling filenames in RMP Affected software: Windows RealPlayer 184.108.40.206 and prior. Credit to Ricardo Narvaja from Core Security Exploit Writers Team , and Gabor Seljan and CERT(R) Coordination Center for reporting this issue."  MITIGATION The vendor recommends updating to the latest version of RealPlayer to correct these issues.  REFERENCES  RealNetworks, Inc. Releases Update to Address Security Vulnerabilities. http://service.real.com/realplayer/security/12202013_player/en/ AusCERT has made every effort to ensure that the information contained in this document is accurate. However, the decision to use the information described is the responsibility of each user or organisation. The decision to follow or act on information or advice contained in this security bulletin is the responsibility of each user or organisation, and should be considered in accordance with your organisation's site policies and procedures. AusCERT takes no responsibility for consequences which may arise from following or acting on information or advice contained in this security bulletin. =========================================================================== Australian Computer Emergency Response Team The University of Queensland Brisbane Qld 4072 Internet Email: email@example.com Facsimile: (07) 3365 7031 Telephone: (07) 3365 4417 (International: +61 7 3365 4417) AusCERT personnel answer during Queensland business hours which are GMT+10:00 (AEST). On call after hours for member emergencies only. =========================================================================== -----BEGIN PGP SIGNATURE----- Comment: http://www.auscert.org.au/render.html?it=1967 iQIVAwUBUreT3xLndAQH1ShLAQJnvRAAsTPQNYDZjUJPgyrMY6JDnOXQ+2/60Tch k0abZpATibzpYg5XWAlZpjiZSxY2sPrXbDsHWvw+jSecYTeBKt551pNkRFjk9o5l K5Y3crVbec+68s0/mJLjD9u8uijVplR2TQBGhEv7hFLka8EJTlMj/ItukPjBZmEz VfZbjZOu0N8a+Yn+OhiF9E1+mHtsgkZJ33XDOzkbG5WDMMz6/YtLD8pfZqMnHvq9 lyeyXC6se0Qwy1R67aX7nv8QZ4Kn/CbMSRnNSHlfeOH3p790DTP0u4fOjl0VnRb5 f80RjT4iKbLSp7yW368s1nE7P7eyHk/Tjo5ZT4WAr+7XlO24GPQnP537rYXsV9L4 UdRJnP8aimrRPK6I7rNlGGiMl7rDGHtBHwhc5qdt3ReDrMe8fUyEUHl+MfeYzdnV 5tlzNtO2bZNtD6R5ei2dH/ZdvRnr/iAcR5Q3Ef+KLNyeTNz1ELaSc2ofNd2AHq5Z wnQtSQgxZ1d+Iex3DlRLj4eDcIniTjdDLxjQtNZsFxsEP3NT5nrSQt0ZnfEGEeN2 eBlBeiRRP1cSt41G7A0ZQI66FpJVB7YMtNFWDzr2Dvut0ovZYCU7wwneDORUMh1P cAK4/gfP/m67dGZ24AGYrUi4FHTdPGhD7XJV27tYXOr0bA+e2R8dru1QIRWCk0g1 ZubnQuSAmqM= =YXZ1 -----END PGP SIGNATURE-----