- RealOne Player
- RealOne Player v2
- RealPlayer 10
- RealPlayer 10.5
- RealPlayer 11 beta
RealNetworks RealPlayer for Microsoft Windows contains a vulnerability that could allow an attacker to take control of your computer when you visit a malicious web site.
Upgrade and install a patch
RealNetworks has released a patch to address this vulnerability. Information about the vulnerability and the patch is available in RealPlayer Security Vulnerability and Security Update for Real Player.
- RealPlayer 10.5 and RealPlayer 11 beta users should install the patch.
- RealOne Player v2, and RealPlayer 10 users should upgrade to RealPlayer 10.5 or RealPlayer 11 beta and then install the patch.
Disable ActiveX for untrusted web sites
Disabling ActiveX in the Internet Zone (or any zone used by an attacker) reduces the chances of exploitation of this and other vulnerabilities. Instructions for disabling ActiveX in the Internet Zone can be found in the "Securing Your Web Browser" document.
There are public reports that this vulnerability is being actively exploited.
A buffer overflow in the way RealPlayer handles playlists received from an ActiveX control on a web page could allow an attacker to access your computer, install and run malicious software on your computer, or cause it to crash.
- RealNetworks RealPlayer Security Update - http://service.real.com/realplayer/security/191007_player/en/>
- Security Update for RealPlayer - http://docs.real.com/docs/security/SecurityUpdate101907Player.pdf>
- US-CERT Technical Cyber Security Alert TA07-297A - <http://www.us-cert.gov/cas/techalerts/TA07-297A.html>
- US-CERT Vulnerability Note VU#871673 - http://www.kb.cert.org/vuls/id/871673>
- Securing Your Web Browser - http://www.us-cert.gov/reading_room/securing_browser/#Internet_Explorer>
October 24, 2007: Initial release
Please share your thoughts.
We recently updated our anonymous product survey; we'd welcome your feedback.