Fortinet Discovers RealNetworks IVR File Processing Vulnerability
SummaryFortinet's FortiGuard Labs has discovered file processing vulnerability in RealNetworks IVR.
SolutionsFortiGuard Labs released the following FortiGate IPS signature which covers this specific vulnerability:
Released Aug 10, 2008
Users should apply the solution provided by RealNetworks.
Additional InformationInternet Video Recording (IVR) files contain media content that is played and recorded by RealPlayer. A remote attacker could craft a malicious IVR file, that when sent to an unsuspecting user, may allow the execution of arbitrary code when viewed, using one of two vulnerabilities during RealPlayer's IVR processing routine:
1) A heap corruption vulnerability that occurs when altering a field that determines the length of a structure.
2) A vulnerability that allows an attacker to write one null byte to an arbitrary memory address by using an overly long file name length value.
It should be noted that the victim does not necessarily have to open the malicious file for exploitation to occur: the vulnerabilities lie in a DLL that is also used as a plugin for the Windows Explorer shell. A successful attack could take place by merely previewing the IVR file through Windows Explorer.