Zero-day vulnerability in RealPlayer

Stack-based buffer overflow

Exploit code for this vulnerability was used during Chinese weekend compromise campaign in May 2008.

Vulnerability details

Advisory: SB2007101701 - Remote code execution in RealNetworks RealPlayer

Vulnerable component: RealPlayer

CVE-ID: CVE-2007-5601

CVSSv3 score: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H/E:H/RL:O/RC:C

CWE-ID: CWE-119 - Memory corruption


The vulnerability allows a remote user to execute arbitrary code on the target system.

The vulnerability exists due to boundary error when processing playlist names passed via "Import()" method to RealPlayer IERPCtl ActiveX control (ierpplug.dll). A remote attacker can create a specially crafted web page, trick the victim into opening it, cause stack-based buffer overflow and execute arbitrary code with privileges of the current user.

Successful exploitation of the vulnerability results in compromise of vulnerable system.

Note: this vulnerability is being actively exploited.

Public Exploits: