Protect yourself against future threats.
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 =========================================================================== AUSCERT Security Bulletin ASB-2014.0075 A vulnerability has been identified in Windows RealPlayer prior to version RealPlayer 17.0.10.8. 8 July 2014 =========================================================================== AusCERT Security Bulletin Summary --------------------------------- Product: RealNetworks RealPlayer Operating System: Windows Impact/Access: Denial of Service -- Remote with User Interaction Resolution: Patch/Upgrade CVE Names: CVE-2014-3113 Member content until: Thursday, August 7 2014 OVERVIEW A vulnerability has been identified in Windows RealPlayer prior to version RealPlayer 17.0.10.8. [1] IMPACT The vendor has provided the following description regarding these issues: "CVE-2014-3113 - Buffer overflow caused by corrupt index type or incorrect media sample size when playing a malformed MP4. Affected software: Windows RealPlayer 17.0.8.22 and prior. Credit to Dehui Yin of Fortinet's FortiGuard Labs for reporting this issue." [1] MITIGATION The vendor recommends updating to the latest version of RealPlayer to correct these issues. [1] REFERENCES [1] RealNetworks, Inc. Releases Update to Address Security Vulnerabilities http://service.real.com/realplayer/security/06272014_player/en/ AusCERT has made every effort to ensure that the information contained in this document is accurate. However, the decision to use the information described is the responsibility of each user or organisation. The decision to follow or act on information or advice contained in this security bulletin is the responsibility of each user or organisation, and should be considered in accordance with your organisation's site policies and procedures. AusCERT takes no responsibility for consequences which may arise from following or acting on information or advice contained in this security bulletin. =========================================================================== Australian Computer Emergency Response Team The University of Queensland Brisbane Qld 4072 Internet Email: auscert@auscert.org.au Facsimile: (07) 3365 7031 Telephone: (07) 3365 4417 (International: +61 7 3365 4417) AusCERT personnel answer during Queensland business hours which are GMT+10:00 (AEST). On call after hours for member emergencies only. =========================================================================== -----BEGIN PGP SIGNATURE----- Comment: http://www.auscert.org.au/render.html?it=1967 iQIVAwUBU7uAdhLndAQH1ShLAQJQhQ/8DGOiPT9pYU7WClui1zUfwQLMn+VlYQTo ZnwohWG1QMAoiCQkv5I58Gv5CM4WsDiLK9izhY2fpwExoy79HkcyFV8FHjjESEHc XDbacOR7oRn7RiE9M69d5OTTp64A24DdfcEGmSHLQJGmu8kNIGdiSsefbMscFtMb yRLR42KoMZNGhHZrelOPlKL01xe8TO1/7aEs9kf+0GQluHfjYWng90S3+KKRqgnN scpJVIe5eOuBR8TgrpgnhW1gHhLao2PG8CMYSIh3K+vKgR8EEhDcqB0mWkfVi4UN UUJSToZ8ClU4a63r3qST02IPA/XLrKvUOjkQ6ks21KEjqTwUAWBp0cpyctrI/pHN 8DzQ8lxGAVKQ/VkfsOb5dtyEwVn0AuAZ9Dk6mEHrXGMF423/35ODGshM2D9/x9Mw TBfHUCBtuTJG7njioeYRUzoqAMp/uVceRbZXkbHDCurRyqSx+r+oLBbc2SaY5BBX +88KH4sf2yUhwMdrBmCQRARBiB6dbECBTYFe5rkNHKAlP382rFEJIOTCdWpm6gsp r/TdwOLvDlMRLZCj0ngm//8aJlF4fkEqUm+DCH4L6f7Q7ZDAT4OEW2QkZ1Gr47KJ 16V4+Bsqq/uTV9ggcog1z9/ZrMrwbJV+jy7hR/Cmer2C2FDiVJOkY8vVWww57KL7 0M6Ug59PA68= =csMU -----END PGP SIGNATURE-----