Exploit code for this vulnerability was used during Chinese weekend compromise campaign in May 2008.
Advisory: SB2007101701 - Remote code execution in RealNetworks RealPlayer
Vulnerable component: RealPlayer
CVSSv3 score: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H/E:H/RL:O/RC:C
CWE-ID: CWE-119 - Memory corruption
The vulnerability allows a remote user to execute arbitrary code on the target system.
The vulnerability exists due to boundary error when processing playlist names passed via "Import()" method to RealPlayer IERPCtl ActiveX control (ierpplug.dll). A remote attacker can create a specially crafted web page, trick the victim into opening it, cause stack-based buffer overflow and execute arbitrary code with privileges of the current user.
Successful exploitation of the vulnerability results in compromise of vulnerable system.
Note: this vulnerability is being actively exploited.
- RealPlayer - 'ierpplug.dll' ActiveX Control Playlist Name Buffer Overflow (Metasploit) [Exploit-DB]
- RealPlayer 10.0/10.5/11 - 'ierpplug.dll' ActiveX Control Import Playlist Name Stack Buffer Overflow [Exploit-DB]