Researcher discovers RealPlayer ActiveX bug
The bug allows malware writers to potentially change heap blocks, which limit the amount of memory that can be stored, to overwrite certain registers, researcher Elazar Broad said today on the website for Neohapsis, a risk and security consultancy. Exploiting the flaw could result in the execution of malicious code.
RealPlayer uses an ActiveX control to play content inside a user's browser. The affected control is rmoc3260.dll version 126.96.36.199, Broad said.
In lieu of a fix, users are encouraged to set the kill bit for the control, he said.
A spokesman for RealPlayer, owned by Real Networks, did not immediately respond to a request for comment.