Heap-based buffer overflow in datatype/smil/common/smlpkt.cpp in smlrender.dll in RealNetworks RealPlayer 10, RealPlayer 10.5 6.0.12.1040 through 6.0.12.1741, RealPlayer 11 11.0.0 through 11.0.4, RealPlayer Enterprise, Mac RealPlayer 10 and 10.1, Linux RealPlayer 10 and 11.0.0, and Helix Player 10.x and 11.0.0 allows remote attackers to execute arbitrary code via an SMIL file with crafted string lengths.
lists.helixcommunity.org/pipermail/datatype-cvs/2008-September/008678.html
secunia.com/advisories/38218
secunia.com/advisories/38450
securitytracker.com/id?1023489
service.real.com/realplayer/security/01192010_player/en/
www.redhat.com/support/errata/RHSA-2010-0094.html
www.securityfocus.com/archive/1/509105/100/0/threaded
www.securityfocus.com/bid/37880
www.vupen.com/english/advisories/2010/0178
www.zerodayinitiative.com/advisories/ZDI-10-007/
bugzilla.redhat.com/show_bug.cgi?id=561309
exchange.xforce.ibmcloud.com/vulnerabilities/55798
helixcommunity.org/viewcvs/datatype/smil/common/smlpkt.cpp?view=log#rev1.12
oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11110