The US-CERT is warning computer users of a possible problem with the latest version of RealPlayer after a Russian security company claimed to have found a way to exploit a critical flaw in the multimedia software.
US-CERT (United States Computer Emergency Readiness Team) published its warning on Wednesday, the day after Gleg Ltd chief technology officer Evgeny Legerov announced the exploit code in a posting to the Daily Dave security discussion list.
The flaw affects the latest version of RealPlayer (RealPlayer 11) running on Windows XP, service pack 2, according to Gleg. A Flash demonstration of the vulnerability has been posted to the Gleg website, but the company has not released its attack code or any technical details of the flaw.
Legerov discovered the flaw, called a stack overflow bug, during an audit of the RealPlayer source code.
Gleg sells 'penetration testing' software that can be used by security professionals to find holes in computer networks. The RealPlayer flaw was added to Gleg's VulnDisco SA software on December 16, which means that subscribers have had access to the code for more than two weeks. VulnDisco SA is sold as an add-on to Immunity's Canvas penetration testing platform.
There have been no reports of the code being released to the general public so far. US-CERT has not been able to study the exploit code and confirm that it works, said Art Manion, vulnerability analysis team leader at US-CERT.
Real is working to confirm whether the exploit code actually works, a company spokesman said.
US-CERT is doing the same thing, Manion said. In the meantime, RealPlayer users should be cautious. "If one wants to assume the most cautious possible stance, you don't use it," Manion said.
In October, criminals exploited another flaw in RealPlayer in order to sneak unauthorised software onto victim's computers. That bug has been patched.