Article

Exploit code targets RealPlayer, researchers warn

SearchSecurity.com Staff

The United States Computer Emergency Readiness Team (US-CERT) is warning of working exploit code targeting a zero-day flaw in the latest version of RealPlayer.

The flaw affects RealPlayer 11 build 6.0.14.748.

Evgeny Legerov, founder of Russian-based security firm, Gleg, announced a few details of the code. Legerov posted a brief announcement at the

    Requires Free Membership to View

Dailydave security discussion board. In his post, Gleg links to a flash demonstration of the working code.

Gleg released the exploit code Dec. 16 to customers that license its periodic updates via its VulnDisco Step Ahead exploit packages. The packages are used with Immunity CANVAS testing software.

Seattle-based Real said it is working to determine the validity of the exploit code.

In October, Real released a patch for 10.5 and 11 beta to remove a security flaw attackers had actively targeted.

Media players are a constant target of attackers.

In late November, exploit code surfaced for a zero-day buffer-overflow flaw in Apple Inc.'s widely used QuickTime media player, giving attackers the opportunity to hijack vulnerable computers running Mac OS X and the latest versions of Microsoft Windows.

Also a serious glitch was discovered in November in how applications from a variety of vendors process audio FLAC files, opening the door for attackers to hijack vulnerable computer systems.


There are Comments. Add yours.

 
TIP: Want to include a code block in your comment? Use <pre> or <code> tags around the desired text. Ex: <code>insert code</code>

REGISTER or login:

Forgot Password?
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy
Sort by: OldestNewest

Forgot Password?

No problem! Submit your e-mail address below. We'll send you an email containing your password.

Your password has been sent to: