Vulnerability Assessment & Network Security Forums

If through a vulnerability assessment, a network security issue is detected for the vulnerability below, applying the appropriate security patches in a timely matter is very important.  If you have detected that your system has already been compromised, following CERT's Network Security recovery document will assist with recommended steps for system recovery.

Home >> Browse Vulnerability Assessment Database >> SuSE Local Security Checks >> SUSE-SA:2006:018: RealPlayer

Vulnerability Assessment Details

SUSE-SA:2006:018: RealPlayer

Vulnerability Assessment Summary
Check for the version of the RealPlayer package

Detailed Explanation for this Vulnerability Assessment

The remote host is missing the patch for the advisory SUSE-SA:2006:018 (RealPlayer).

This update fixes the following security problems in Realplayer:

- Specially crafted SWF files could cause a buffer overflow and
crash RealPlayer (CVE-2006-0323).

- Specially crafted web sites could cause heap overflow and lead to
executing arbitrary code (CVE-2005-2922). This was already fixed
with the previously released 1.0.6 version, but not announced on
request of Real.

The advisory for these problems is on this page at Real:

SUSE Linux 9.2 up to 10.0 and Novell Linux Desktop 9 are affected by
this problem and receive fixed packages.

If you are still using Realplayer on SUSE Linux 9.1 or SUSE Linux
Desktop 1, we again wish to remind you that the Real player on these
products cannot be updated and recommend to deinstall it.

Solution :
Network Security Threat Level: High

Networks Security ID:

Vulnerability Assessment Copyright: This script is Copyright (C) 2006 Tenable Network Security

Cables, Connectors

FOR IBM Lenovo Thinkpad Hard Drive Caddy Rails T60 T60p T61 T61p T400 T420 T430
FOR IBM Lenovo Thinkpad Hard Drive Caddy Rails T60 T60p T61 T61p T400 T420 T430 picturetoshiba ocz rd400
toshiba ocz rd400 picturewd elements 1tb
wd elements 1tb pictureMaxtor 4.3GB 3.5" IDE Hard Drive (90432D3)
Maxtor 4.3GB 3.5


No Discussions have been posted on this vulnerability.