Lucene search

K
zdiDamian PutZDI-11-337
HistoryNov 28, 2011 - 12:00 a.m.

RealNetworks RealPlayer RV30 Uninitialized Index Value Remote Code Execution Vulnerability

2011-11-2800:00:00
Damian Put
www.zerodayinitiative.com
13

EPSS

0.033

Percentile

91.5%

This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of RealNetworks Real Player. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within how the application parses sample data encoded with the RV30 codec. When parsing this sample data, the application will make an allocation and then fail to completely initialize the buffer. During decoding of the sample data, the application will explicitly trust an index from the partially filled buffer and then use that to calculate an address to write to. This can lead to memory corruption which can be converted into code execution under the context of the application.

EPSS

0.033

Percentile

91.5%