Fortinet Discovers RealPlayer MP4 File Parsing Memory Corruption Vulnerability
Summary
Fortinet's FortiGuard Labs has discovered a buffer overflow vulnerability in RealNetworks RealPlayer.
RealPlayer is a cross-platform media player app, developed by RealNetworks. The media player is compatible with numerous container file formats of the multimedia realm, including MP3, MP4, QuickTime File Format, Windows Media format, and the proprietary RealAudio and RealVideo formats. RealPlayer is also available for other operating systems.
A buffer overflow vulnerability has been discovered in RealPlayer. The vulnerability can be triggered by a specifically crafted MP4 file with the "Sample Size" member of a 'stsz' structure having an overly long size value. Successful exploitation of this vulnerability could grant an attacker remote code execution.
Solutions
FortiGuard Labs released the following FortiGate IPS signature which covers this specific vulnerability:RealNetworks.RealPlayer.MP4.File.Parsing.Memory.Corruption
Released Dec 12, 2016
Users should apply the solution provided by RealNetworks.
Additional Information
Fortinet reported the vulnerability to RealNetworks on Sep. 7.
RealNetworks confirmed the vulnerability on Oct. 10.
RealNetworks patched the vulnerability on Dec. 20.