Bug 150105

Summary: CAN-2005-0611 .wav overflow in HelixPlayer
Product: [Fedora] Fedora Reporter: Josh Bressers <bressers>
Component: HelixPlayerAssignee: John (J5) Palmieri <johnp>
Status: CLOSED ERRATA QA Contact:
Severity: urgent Docs Contact:
Priority: medium    
Version: 3CC: bressers, jkeck
Target Milestone: ---Keywords: Security
Target Release: ---   
Hardware: All   
OS: Linux   
Whiteboard: impact=critical,public=20050301,source=bugtraq,reported=20050301
Fixed In Version: Doc Type: Bug Fix
Doc Text:
Story Points: ---
Clone Of: Environment:
Last Closed: 2005-03-14 18:53:00 UTC Type: ---
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:
Embargoed:
Bug Depends On:    
Bug Blocks: 150048    

Description Josh Bressers 2005-03-02 15:32:32 UTC
+++ This bug was initially created as a clone of Bug #150103 +++

http://service.real.com/help/faq/security/050224_player/EN/
reports a flaw in Realplayer allowing a malicious .wav file to execute
arbitrary code, this is critical.

Comment 1 Ray Strode [halfline] 2005-03-14 18:53:00 UTC
I pushed an FC3 update for this a while ago. Closing...