Researcher posts attack code for RealPlayer bug

Buggy ActiveX control puts IE users at risk

A noted ActiveX researcher Monday revealed a bug in RealNetworks' RealPlayer that could be exploited by attackers to hijack Windows machines running nternet Explorer.

Elazar Broad, who has uncovered other ActiveX control vulnerabilities in MySpace , Facebook and Yahoo software in the last two months, posted findings to the Full Disclosure security mailing list on Monday that fingered RealPlayer as flawed.

"It is possible to modify heap blocks after they are freed and overwrite certain registers, possibly allowing code execution," Broad said in his message to the mailing list. He also posted proof-of-concept attack code, and said he is trying to come with a working exploit.

Danish vulnerability tracker Secunia rated the RealPlayer bug as "highly critical," its second-highest ranking, and said that the flawed ActiveX control -- the "rmoc3260.dll" file is the culprit -- can be exploited by the usual method of tricking users into visiting malicious or compromised Web sites.

Secunia confirmed the vulnerability, and added that at minimum, the newest build of RealPlayer 11 is buggy. Other, earlier versions may be, too.

The last time RealPlayer was knocked about by hackers was October 2007, when exploits leveraged another bug in its ActiveX control; the attackers were serious enough for some organizations, including a NASA research facility, to tell their users to discard Internet Explorer.

Because the bug is in an ActiveX control, only IE users are at risk. ActiveX, though widely used by Microsoft to add functionality to its browser, has been plagued with a huge number of vulnerabilities. According to Symantec, 89 per cent of the more than 230 browser plug-in bugs tallied in the first half of 2007 were ActiveX flaws.

Some security professionals, in fact, have called for users to ditch ActiveX . Last month, US-CERT did just that: "US-CERT encourages users to disable ActiveX controls as described in the Securing Your Web Browser document," the organization advised.

There is no patch for the RealPlayer vulnerability, but technically-astute users can edit the Windows registry to set the "kill bit" for the flawed control. Another alternative, said the SANS Institute's Internet Storm Center, is to switch browsers; Firefox and Opera, for instance, don't rely on ActiveX.

RealNetworks did not reply to a request for comment.

Join the newsletter!

Or

Sign up to gain exclusive access to email subscriptions, event invitations, competitions, giveaways, and much more.

Membership is free, and your security and privacy remain protected. View our privacy policy before signing up.

Error: Please check your email address.
Keep up with the latest tech news, reviews and previews by subscribing to the Good Gear Guide newsletter.
Gregg Keizer

Gregg Keizer

Computerworld
Show Comments

Brand Post

Most Popular Reviews

Latest Articles

Resources

PCW Evaluation Team

Tom Pope

Dynabook Portégé X30L-G

Ultimately this laptop has achieved everything I would hope for in a laptop for work, while fitting that into a form factor and weight that is remarkable.

Tom Sellers

MSI P65

This smart laptop was enjoyable to use and great to work on – creating content was super simple.

Lolita Wang

MSI GT76

It really doesn’t get more “gaming laptop” than this.

Jack Jeffries

MSI GS75

As the Maserati or BMW of laptops, it would fit perfectly in the hands of a professional needing firepower under the hood, sophistication and class on the surface, and gaming prowess (sports mode if you will) in between.

Taylor Carr

MSI PS63

The MSI PS63 is an amazing laptop and I would definitely consider buying one in the future.

Christopher Low

Brother RJ-4230B

This small mobile printer is exactly what I need for invoicing and other jobs such as sending fellow tradesman details or step-by-step instructions that I can easily print off from my phone or the Web.

Featured Content

Product Launch Showcase

Don’t have an account? Sign up here

Don't have an account? Sign up now

Forgot password?