DSA-826-1 helix-player -- multiple vulnerabilities

Related Vulnerabilities: CVE-2005-1766   CVE-2005-2710  

Multiple security vulnerabilities have been identified in the helix-player media player that could allow an attacker to execute code on the victim's machine via specially crafted network resources. CAN-2005-1766 Buffer overflow in the RealText parser could allow remote code execution via a specially crafted RealMedia file with a long RealText string. CAN-2005-2710 Format string vulnerability in Real HelixPlayer and RealPlayer 10 allows remote attackers to execute arbitrary code via the image handle attribute in a RealPix (.rp) or RealText (.rt) file. For the stable distribution (sarge), these problems have been fixed in version 1.0.4-1sarge1 For the unstable distribution (sid), these problems have been fixed in version 1.0.6-1 We recommend that you upgrade your helix-player package. helix-player was distributed only on the i386 and powerpc architectures

Debian Security Advisory

DSA-826-1 helix-player -- multiple vulnerabilities

Date Reported:
29 Sep 2005
Affected Packages:
helix-player
Vulnerable:
Yes
Security database references:
In the Debian bugtracking system: Bug 316276, Bug 330364.
In Mitre's CVE dictionary: CVE-2005-1766, CVE-2005-2710.
More information:

Multiple security vulnerabilities have been identified in the helix-player media player that could allow an attacker to execute code on the victim's machine via specially crafted network resources.

  • CAN-2005-1766

    Buffer overflow in the RealText parser could allow remote code execution via a specially crafted RealMedia file with a long RealText string.

  • CAN-2005-2710

    Format string vulnerability in Real HelixPlayer and RealPlayer 10 allows remote attackers to execute arbitrary code via the image handle attribute in a RealPix (.rp) or RealText (.rt) file.

For the stable distribution (sarge), these problems have been fixed in version 1.0.4-1sarge1

For the unstable distribution (sid), these problems have been fixed in version 1.0.6-1

We recommend that you upgrade your helix-player package.

helix-player was distributed only on the i386 and powerpc architectures

Fixed in:

Debian GNU/Linux 3.1 (sarge)

Source:
http://security.debian.org/pool/updates/main/h/helix-player/helix-player_1.0.4-1sarge1.dsc
http://security.debian.org/pool/updates/main/h/helix-player/helix-player_1.0.4-1sarge1.diff.gz
http://security.debian.org/pool/updates/main/h/helix-player/helix-player_1.0.4.orig.tar.gz
Intel IA-32:
http://security.debian.org/pool/updates/main/h/helix-player/helix-player_1.0.4-1sarge1_i386.deb
PowerPC:
http://security.debian.org/pool/updates/main/h/helix-player/helix-player_1.0.4-1sarge1_powerpc.deb

MD5 checksums of the listed files are available in the original advisory.