Bug 168657 - CVE-2005-2922 chunked encoding real flaw
Summary: CVE-2005-2922 chunked encoding real flaw
Alias: None
Product: Red Hat Enterprise Linux 4
Classification: Red Hat
Component: realplayer
Version: 4.0
Hardware: All
OS: Linux
Target Milestone: ---
: ---
Assignee: John (J5) Palmieri
QA Contact:
Whiteboard: impact=critical,reported=20050916,pub...
Keywords: Security
Depends On:
TreeView+ depends on / blocked
Reported: 2005-09-19 07:33 UTC by Mark J. Cox
Modified: 2013-03-13 04:49 UTC (History)
2 users (show)

Clone Of:
Last Closed: 2005-09-27 14:03:56 UTC

Attachments (Terms of Use)

Description Mark J. Cox 2005-09-19 07:33:03 UTC
Real reported this flaw on 20050916:

Remote exploitation of a heap-based buffer overflow could allow the execution of
arbitrary code in the context of the currently logged in user.

The vulnerability specifically exists in the handling of the 'chunked'
Transfer-Encoding method.

Successful exploitation allows a remote attacker to execute arbitrary code with
the privileges of the currently logged in user. In order to exploit this
vulnerability, an attacker would need to entice a user to follow a link to a
malicious server. Once the user visits a website under the control of an
attacker, it is possible in a default install of RealPlayer to force a
web-browser to use RealPlayer to connect to an arbitrary server, even when it is
not the default application for handling those types, by the use of embeded
object tags in a webpage. This may allow automated exploitation when the page is

As the client sends its version information as part of the request, it would be
possible for an attacker to create a malicious server which uses the appropriate
offsets and shellcode for each version and platform of the client.

Possible embargo is 20051018

Comment 1 Mark J. Cox 2005-09-27 14:03:56 UTC
These will be fixed in RHSA-2005:762 without mention of this issue for now as
it's still embargoed.

Comment 2 Mark J. Cox 2006-03-24 08:52:06 UTC

Opening bug as this issue was released earlier this week.

Note You need to log in before you can comment on or make changes to this bug.