ATTENTION: You are viewing a page formatted for mobile devices; to view the full web page, click HERE.

Main Area and Open Discussion > General Software Discussion

Attacks exploiting RealPlayer zero-day security risk

(1/2) > >>

mouser:
This one sounds a bit serious..

October 19, 2007 (Computerworld) -- Attackers are exploiting a zero-day vulnerability in RealPlayer in order to infect Windows machines running Internet Explorer, Symantec Corp. said late Thursday. The security company issued an alert that rated the threat with its highest possible score.

According to a warning issued to customers of its DeepSight threat network, Symantec said an ActiveX control installed by RealNetworks Inc.'s RealPlayer program is flawed. When combined with Microsoft Corp.'s Internet Explorer (IE) browser -- which relies on ActiveX controls to extend its functionality -- the bug can be exploited and malicious code downloaded to any PC that wanders to a specially crafted site.

Only systems on which both RealPlayer and IE have been installed are vulnerable.

Symantec ranked the attack as a "10" on its urgency scale because it has confirmed that attacks are being conducted in the wild; those attacks have resulted in malicious code downloaded to victimized PCs.

--- End quote ---

http://www.computerworld.com/action/article.do?command=viewArticleBasic&articleId=9043319




mouser:
Anyone know a utility for disabling activex plugins? Does nirsoft have one?

Lashiec:
Yes, it does. But you can deactivate ActiveX in IE7 as well, under Tools -> Addons Management (made up translation).

This is the price to pay for using RealPlayer >:D

nudone:
dumb question, but would this also include 'real alternative' codec as i assume a lot of the real player content has been stripped away?

(can't get the referenced article to load at the moment.)

mouser:
Thanks Lashiec, found realplayer activex in that list and disabled it.

Navigation

[0] Message Index

[#] Next page

Go to full version