RealNetworks RealPlayer 10.0/10.1/10.5 smlprstime.cpp parsewallclockvalue memory corruption
CVSS Meta Temp Score | Current Exploit Price (≈) | CTI Interest Score |
---|---|---|
9.0 | $0-$5k | 0.00 |
A vulnerability classified as critical was found in RealNetworks RealPlayer 10.0/10.1/10.5 (Multimedia Player Software). Affected by this vulnerability is the function smiltimevalue::parsewallclockvalue
of the file smlprstime.cpp. The manipulation with an unknown input leads to a memory corruption vulnerability. The CWE definition for the vulnerability is CWE-119. The product performs operations on a memory buffer, but it can read from or write to a memory location that is outside of the intended boundary of the buffer. As an impact it is known to affect confidentiality, integrity, and availability. The summary by CVE is:
Stack-based buffer overflow in the SmilTimeValue::parseWallClockValue function in smlprstime.cpp in RealNetworks RealPlayer 10, 10.1, and possibly 10.5, RealOne Player, RealPlayer Enterprise, and Helix Player 10.5-GOLD and 10.0.5 through 10.0.8, allows remote attackers to execute arbitrary code via an SMIL (SMIL2) file with a long wallclock value.
The weakness was disclosed 06/26/2007 as confirmed advisory (CERT.org). The advisory is shared at kb.cert.org. This vulnerability is known as CVE-2007-3410 since 06/26/2007. The attack can be launched remotely. The exploitation doesn't need any form of authentication. Technical details and also a public exploit are known.
It is possible to download the exploit at saintcorporation.com. It is declared as proof-of-concept. We expect the 0-day to have been worth approximately $25k-$100k. The vulnerability scanner Nessus provides a plugin with the ID 67538 (Oracle Linux 4 : HelixPlayer (ELSA-2007-0605)), which helps to determine the existence of the flaw in a target environment. It is assigned to the family Oracle Linux Local Security Checks and running in the context l.
Upgrading eliminates this vulnerability. A possible mitigation has been published 10 hours after the disclosure of the vulnerability. Attack attempts may be identified with Snort ID 12023. Furthermore it is possible to detect and prevent this kind of attack with TippingPoint and the filter 5557.
The vulnerability is also documented in the databases at X-Force (35088), Tenable (67538) and Exploit-DB (4118). The entries 39504, 39503, 39502 and 39500 are pretty similar.
Product
Type
Vendor
Name
Version
License
CPE 2.3
CPE 2.2
CVSSv4
VulDB CVSS-B Score: 🔍VulDB CVSS-BT Score: 🔍
VulDB Vector: 🔍
VulDB Reliability: 🔍
CVSSv3
VulDB Meta Base Score: 10.0VulDB Meta Temp Score: 9.0
VulDB Base Score: 10.0
VulDB Temp Score: 9.0
VulDB Vector: 🔍
VulDB Reliability: 🔍
CVSSv2
AV | AC | Au | C | I | A |
---|---|---|---|---|---|
💳 | 💳 | 💳 | 💳 | 💳 | 💳 |
💳 | 💳 | 💳 | 💳 | 💳 | 💳 |
💳 | 💳 | 💳 | 💳 | 💳 | 💳 |
Vector | Complexity | Authentication | Confidentiality | Integrity | Availability |
---|---|---|---|---|---|
unlock | unlock | unlock | unlock | unlock | unlock |
unlock | unlock | unlock | unlock | unlock | unlock |
unlock | unlock | unlock | unlock | unlock | unlock |
VulDB Base Score: 🔍
VulDB Temp Score: 🔍
VulDB Reliability: 🔍
NVD Base Score: 🔍
Exploiting
Class: Memory corruptionCWE: CWE-119
ATT&CK: Unknown
Local: No
Remote: Yes
Availability: 🔍
Access: Public
Status: Proof-of-Concept
Download: 🔍
EPSS Score: 🔍
EPSS Percentile: 🔍
Price Prediction: 🔍
Current Price Estimation: 🔍
0-Day | unlock | unlock | unlock | unlock |
---|---|---|---|---|
Today | unlock | unlock | unlock | unlock |
Nessus ID: 67538
Nessus Name: Oracle Linux 4 : HelixPlayer (ELSA-2007-0605)
Nessus File: 🔍
Nessus Risk: 🔍
Nessus Family: 🔍
Nessus Context: 🔍
Nessus Port: 🔍
OpenVAS ID: 60115
OpenVAS Name: FreeBSD Ports: linux-realplayer
OpenVAS File: 🔍
OpenVAS Family: 🔍
Saint ID: exploit_info/realplayer_smil_wallclock
Saint Name: RealPlayer SMIL file wallclock buffer overflow
Exploit-DB: 🔍
Threat Intelligence
Interest: 🔍Active Actors: 🔍
Active APT Groups: 🔍
Countermeasures
Recommended: UpgradeStatus: 🔍
Reaction Time: 🔍
Exposure Time: 🔍
Snort ID: 12023
TippingPoint: 🔍
McAfee IPS: 🔍
McAfee IPS Version: 🔍
ISS Proventia IPS: 🔍
PaloAlto IPS: 🔍
Fortigate IPS: 🔍
Timeline
06/26/2007 🔍06/26/2007 🔍
06/26/2007 🔍
06/26/2007 🔍
06/26/2007 🔍
06/26/2007 🔍
06/27/2007 🔍
06/27/2007 🔍
07/01/2007 🔍
08/17/2007 🔍
07/12/2013 🔍
03/15/2015 🔍
07/21/2019 🔍
Sources
Vendor: realnetworks.comAdvisory: kb.cert.org
Status: Confirmed
Confirmation: 🔍
CVE: CVE-2007-3410 (🔍)
OVAL: 🔍
IAVM: 🔍
X-Force: 35088
SecurityTracker: 1018297
Vulnerability Center: 15495 - Real Networks RealPlayer and HelixPlayer Vulnerability Allows Code Execution and DoS, Critical
SecurityFocus: 24658 - RealPlayer/HelixPlayer ParseWallClockValue Function Buffer Overflow Vulnerability
Secunia: 26463
OSVDB: 37374 - RealPlayer/Helix Player smlprstime.cpp SmilTimeValue::parseWallClockValue Function SMIL File Handling Overflow
Vupen: ADV-2007-2339
scip Labs: https://www.scip.ch/en/?labs.20161013
See also: 🔍
Entry
Created: 03/15/2015 15:58Updated: 07/21/2019 09:39
Changes: 03/15/2015 15:58 (103), 07/21/2019 09:39 (2)
Complete: 🔍
No comments yet. Languages: en.
Please log in to comment.