Zero-day vulnerabilities discovered: 1
Stack-based buffer overflow
The vulnerability allows a remote user to execute arbitrary code on the target system.
The vulnerability exists due to boundary error when processing playlist names passed via "Import()" method to RealPlayer IERPCtl ActiveX control (ierpplug.dll). A remote attacker can create a specially crafted web page, trick the victim into opening it, cause stack-based buffer overflow and execute arbitrary code with privileges of the current user.
Successful exploitation of the vulnerability results in compromise of vulnerable system.
Note: this vulnerability is being actively exploited.
Exploit code for this vulnerability was used during Chinese weekend compromise campaign in May 2008.
Software: RealPlayer
Links:
https://www.symantec.com/connect/blogs/realplayer-exploit-loose
http://www.kb.cert.org/vuls/id/871673
https://www.symantec.com/security_response/attacksignatures/detail.jsp?asid=22629
http://blog.trendmicro.com/trendlabs-security-intelligence/chinese-weekend-compromise/
http://www.pcworld.com/article/146048/article.html
http://www.sudosecure.com/malicious-site-analysis-for-dota11cn-injection/