For the second time in eight days, new critical vulnerabilities that could be used to hijack machines have been identified in the RealPlayer media player.
However, the patched editions released last Friday for Windows, are not vulnerable to the half-dozen bugs, RealNetworks said.
RealNetworks posted information about the latest vulnerabilities hard on the heels of the revelation that RealPlayer sported a major flaw - a bug that had been exploited by hackers who had compromised an ad server to spread malware to visitors of legitimate, trusted websites.
All six bugs involve RealPlayer’s problems parsing file formats and could be exploited by hackers who first crafted malicious files, then duped users into either opening those rigged files when they received them as email attachments, or visiting an attack site that hosted such files. The file types included: .mov, .mp3, .rm, SMIL, .swf, .ram and .pl.
“Attackers can exploit these issues to execute arbitrary code in the context of RealPlayer,” Symantec said in an alert on Friday. “Successful attacks can compromise the application and the underlying computer.”
RealNetworks said that the most up-to-date Windows editions of RealPlayer 10.5 and beta Version 11 are immune to the attacks. Those versions were released on Friday when RealNetworks fixed a flaw in an ActiveX control it installed on systems running Internet Explorer. At least one of the newest flaws can also be traced to the ActiveX control.
Unlike last week’s problem, however, four of the six vulnerabilities disclosed also can be exploited on Mac and Linux machines that have RealPlayer installed. Updated editions are also available for those operating systems, with links available from the security bulletin RealNetworks posted on its site.
Copenhagen-based vulnerability tracker Secunia rated the six just-revealed RealPlayer bugs collectively as “highly critical,” the second-highest mark it gives. Symantec rated the bugs separately, with at least one pegged as 8.5 out of a possible 10. But RealNetworks downplayed the risk. “We have received no reports of any machines actually compromised as a result of the now-remedied vulnerabilities,” the company claimed.
It can’t say the same for last week’s vulnerability, which was used by unknown attackers to plant a Trojan horse on PCs whose owners had visited supposedly safe websites. The hackers had previously hijacked an ad server operated by Internet advertising company 24/7 Real Media, then infected valid ads that 24/7 served to legitimate sites. When users viewed a page with an infected ad, their Internet Explorer browser was silently redirected to a malicious page from which the Trojan was downloaded and installed.
Although Symantec posted a detailed analysis of the RealPlayer vulnerability and the use of the compromised ad server, 24/7 Real Media has not responded to repeated emails seeking comment.
Find your next job with techworld jobs