With attack code circulating, RealPlayer fix coming

RealNetworks says it will patch a critical patch in its media player after attack code surfaced.

One day after Symantec researchers discovered software that attacked a critical unpatched vulnerability in RealNetworks' media player, Real says that a fix for the issue is imminent.

"Real has created a patch for RealPlayer 10.5 and RealPlayer 11 that addresses the vulnerability identified by Symantec," wrote RealNetworks General Manager of Product Development Russ Ryan, in a Friday blog posting. "Real will make this patch available to users via this blog and our security update page later today."

Users of RealOne Player, RealOne Player v2, and RealPlayer 10 should upgrade to the 10.5 version of the product or the RealPlayer 11 beta code and should install the patch, Ryan said.

The attack exploits a flaw in an ActiveX browser helper object, software that RealPlayer employs to help users who are experiencing technical difficulties, so the PC must be using the Internet Explorer browser to be affected by this particular attack, Symantec said.

The attack only works on Windows systems, RealNetworks said. Linux, Mac and RealPlayer 8 users are not affected.

Attackers were using a complicated network of advertising Web sites to launch the attack from a Web site that has been spotted hosting malicious code several times over the past two years, Symantec said.

"The exploit itself is embedded in advertisements that were being served by 247realmedia.com," Symantec said in a note on its DeepSight threat management system. "The redirection to the exploit page... was accomplished through an iFrame embedded in each advertisement."

Iframe is an HTML command that allows developers to insert a second Web page into the page being viewed. It is often used by malware creators because these iFrame pages can be as small as 1 pixel, making them invisible to the naked eye.

Users who do not have the patch can turn off ActiveScripting within IE as a workaround to the problem. Very technical users can also set kill bit on the Class identifier (CLSID) FDC7A535-4070-4B92-A0EA-D9994BCC0DC5 to disable the ActiveX control, Symantec said.

Recommended

Keep up with the latest tech news, reviews and previews by subscribing to the Good Gear Guide newsletter.

Robert McMillan

IDG News Service

Comments

Comments are now closed.

Most Popular Reviews

Follow Us

Best Deals on GoodGearGuide

Shopping.com

Latest News Articles

Resources

GGG Evaluation Team

Kathy Cassidy

STYLISTIC Q702

First impression on unpacking the Q702 test unit was the solid feel and clean, minimalist styling.

Anthony Grifoni

STYLISTIC Q572

For work use, Microsoft Word and Excel programs pre-installed on the device are adequate for preparing short documents.

Steph Mundell

LIFEBOOK UH574

The Fujitsu LifeBook UH574 allowed for great mobility without being obnoxiously heavy or clunky. Its twelve hours of battery life did not disappoint.

Andrew Mitsi

STYLISTIC Q702

The screen was particularly good. It is bright and visible from most angles, however heat is an issue, particularly around the Windows button on the front, and on the back where the battery housing is located.

Simon Harriott

STYLISTIC Q702

My first impression after unboxing the Q702 is that it is a nice looking unit. Styling is somewhat minimalist but very effective. The tablet part, once detached, has a nice weight, and no buttons or switches are located in awkward or intrusive positions.

Latest Jobs

Don’t have an account? Sign up here

Don't have an account? Sign up now

Forgot password?