Advisory Details ---------------- Title: RealNetworks Helix Server 9 Administration Server Buffer Overflow Announcement date: 18 March 2004 Advisory Reference: ptl-2004-02 CVE Name: CAN-2004-0049 Products: Various RealNetworks Server Products (See Below) Vulnerability Type : Buffer Overflow Vendor-URL: http://www.realnetworks.com Vendor-Status: Updated Version / Plugin Released Remotely Exploitable: Yes (Authenticated User) Locally Exploitable: Yes (Authenticated User) Advisory URL: http://www.pentest.co.uk/
Vulnerability Description -------------------------- Several of Real Networks Helix Server products utilise a common Administration Interface which is available over HTTP and protected by HTTP Basic Authentication.
An authenticated attacker can submit malformed HTTP POST requests to the server's Administration interface, triggering a buffer overflow and executing arbitrary code on the server.
On Windows platforms where the Helix Server is run as an NT Service, this allows arbitrary code execution under the context of the NT SYSTEM account.
It should be noted that the Server does not have a default username and password - these are set during installation. In addition to this, the Server runs on a random TCP port, configured during installation.
Vulnerable Versions -------------------- Helix Universal Mobile Server & Gateway 10, version 10.1.1.120 and prior Helix Universal Server and Gateway 9, version 9.0.2.881 and prior
Whilst Windows 2000 was the only platform tested and confirmed to be exploitable by Pentest Limited, the vendor advisory indicates that multiple platforms are affected by this vulnerability including Solaris, Linux, AIX, and FreeBSD.
Fix --- Updated versions of Helix Universal Server and Gateway 9 are available from RealNetworks.
Further details are available in the RealNetworks advisory, available at:
Attachment:
pgp00000.pgp
Description: PGP signature