This vulnerability involved a complex interaction between a maliciously created SMIL file and specifically crafted web server caused a heap overflow in the error message processing for RealText which could have allowed an attacker to execute arbitrary code on a customer's machine.
Can we get some packages built ASAP, this is a critical issue and we want to be ready on day 0. Additionally, I have a bug 159868 for RHEL3, I don't know if the RHEL4 binaries will work properly.
Built and symlinked in dist-4E-lacd-errata-candidate
Lifting embargo
An advisory has been issued which should help the problem described in this bug report. This report is therefore being closed with a resolution of ERRATA. For more information on the solution and/or where to find the updated files, please follow the link below. You may reopen this bug report if the solution does not work for you. http://rhn.redhat.com/errata/RHSA-2005-523.html