Monday, December 22, 2014
Search
  
Thursday, April 06, 2006
 RealNetworks Vulnerabilites
You are sending an email that contains the article
and a private message for your recipient(s).
Your Name:
Your e-mail: * Required!
Recipient (e-mail): *
Subject: *
Introductory Message:
HTML/Text
(Photo: Yes/No)
(At the moment, only Text is allowed...)
 
Message Text: Multiple buffer overflow vulnerabilities in RealNetworks products could allow a remote attacker to execute arbitrary code, warned U.S. Computer Emergency Readiness Team (US-CERT).

"These vulnerabilities can be exploited by convincing a user to access a web page that references a specially crafted Flash (SWF) file,access a web page that references a specially crafted mimio boardcast (MBC) file and access a RealMedia file embedded in web page hosted on a malicious server", reads the security release posted on Wednesday.

To diminish the security risks, US-CERT recommends to apply the patches that RealNetworks released in last moth's security update. Also, users are suggested to disable RealPlayer AcitveX control in Internet Explorer and RealPlayer Plugin in other browsers. Finally, Us-CERT resommends not to visit untrusted web sites and not to follow supsicious links.
 
Home | News | All News | Reviews | Articles | Guides | Download | Expert Area | Forum | Site Info
Site best viewed at 1024x768+ - CDRINFO.COM 1998-2014 - All rights reserved -
Privacy policy - Contact Us .