Exploit code for this vulnerability was used during Chinese weekend compromise campaign in May 2008.
Vulnerability details
Advisory: SB2007101701 - Remote code execution in RealNetworks RealPlayer
Vulnerable component: RealPlayer
CVE-ID: CVE-2007-5601
CVSSv3 score: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H/E:H/RL:O/RC:C
CWE-ID: CWE-119 - Memory corruption
Description:
The vulnerability allows a remote user to execute arbitrary code on the target system.
The vulnerability exists due to boundary error when processing playlist names passed via "Import()" method to RealPlayer IERPCtl ActiveX control (ierpplug.dll). A remote attacker can create a specially crafted web page, trick the victim into opening it, cause stack-based buffer overflow and execute arbitrary code with privileges of the current user.
Successful exploitation of the vulnerability results in compromise of vulnerable system.
Note: this vulnerability is being actively exploited.
Public Exploits:
- RealPlayer - 'ierpplug.dll' ActiveX Control Playlist Name Buffer Overflow (Metasploit) [Exploit-DB]
- RealPlayer 10.0/10.5/11 - 'ierpplug.dll' ActiveX Control Import Playlist Name Stack Buffer Overflow [Exploit-DB]
External links:
https://www.symantec.com/connect/blogs/realplayer-exploit-loose
http://www.kb.cert.org/vuls/id/871673
https://www.symantec.com/security_response/attacksignatures/detail.jsp?asid=22629
http://blog.trendmicro.com/trendlabs-security-intelligence/chinese-weekend-compromise/
http://www.pcworld.com/article/146048/article.html
http://www.sudosecure.com/malicious-site-analysis-for-dota11cn-injection/