RealNetworks Helix Servers DESCRIBE Request LoadTestPassword Field Remote Overflow

This script is Copyright (C) 2007-2013 Tenable Network Security, Inc.


Synopsis :

The remote RTSP server suffers from a buffer overflow vulnerability.

Description :

The remote host is running Helix DNA Server or Helix Server, a media
streaming server.

The version of the Helix server installed on the remote host contains
a heap overflow involving an invalid 'LoadTestPassword' field. An
unauthenticated, remote attacker can leverage this flaw using a simple
'DESCRIBE' request to crash the affected application and possibly to
execute arbitrary code subject to the privileges of the user id under
which it runs, which by default on Windows is LOCAL SYSTEM.

See also :

http://www.nessus.org/u?6449002c
http://www.securityfocus.com/archive/1/463333/30/0/threaded
http://www.nessus.org/u?27db559a
http://docs.real.com/docs/security/SecurityUpdate032107Server.pdf

Solution :

Upgrade to Helix Server / Helix DNA Server version 11.1.3 or later.

Risk factor :

Critical / CVSS Base Score : 10.0
(CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVSS Temporal Score : 9.0
(CVSS2#E:POC/RL:U/RC:ND)
Public Exploit Available : true

Family: Gain a shell remotely

Nessus Plugin ID: 24876 (helix_loadtestpassword_overflow.nasl)

Bugtraq ID: 21141
23068

CVE ID: CVE-2006-6026