{"id":3325,"date":"2004-04-09T10:02:21","date_gmt":"2004-04-09T08:02:21","guid":{"rendered":"https:\/\/destinationcyber.com\/?p=3325"},"modified":"2004-04-09T10:02:21","modified_gmt":"2004-04-09T08:02:21","slug":"faille-critique-reperee-dans-realplayer","status":"publish","type":"post","link":"https:\/\/destinationcyber.com\/?p=3325","title":{"rendered":"Faille critique rep\u00e9r\u00e9e dans RealPlayer"},"content":{"rendered":"<p class=\"post_excerpt\">Elle permet \u00e0 un attaquant distant d&rsquo;ex\u00e9cuter des commandes arbitraires sur le syst\u00e8me de la victime<\/p>\n<p> Apr\u00e8s Winamp, c&rsquo;est au tour d&rsquo;un autre tr\u00e8s populaire lecteur multim\u00e9dia, RealPlayer d&rsquo;\u00eatre victime d&rsquo;une faille. Et ce n&rsquo;est pas la premi\u00e8re fois: en f\u00e9vrier dernier, une faille critique avait d\u00e9j\u00e0 \u00e9t\u00e9 rep\u00e9r\u00e9e par des experts britanniques.<\/p>\n<p>Cette fois, le \u00ab\u00a0trou\u00a0\u00bb a \u00e9t\u00e9 d\u00e9couvert par plusieurs sources: RealNetworks l&rsquo;\u00e9diteur du logiciel et NGSSoftware. Il permet \u00e0 un attaquant distant d&rsquo;ex\u00e9cuter des commandes arbitraires sur le syst\u00e8me de la victime.<\/p>\n<p>Cette vuln\u00e9rabilit\u00e9 est la cons\u00e9quence d&rsquo;une erreur de type buffer overflow pr\u00e9sente dans le processus de gestion des fichiers R3T (RealText 3D). Il faut noter que la faille est exploitable uniquement si le plugin R3T est install\u00e9.<\/p>\n<p>Les versions concern\u00e9es sont RealPlayer 8, RealOne Player, RealOne Player v2 pour Windows, Real Player 10b et RealPlayer Entreprise.<\/p>\n<p>Pour se prot\u00e9ger, les utilisateurs peuvent se rendre sur le <a href=\"http:\/\/www.service.real.com\/help\/faq\/security\/040406_r3t\/en\/\">site<\/a> de Real Networks pour t\u00e9l\u00e9charger les mises \u00e0 jour ou savoir comment retirer les composants vuln\u00e9rables. <\/p>\n<p>[source &#8211; Silicon.fr]&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Elle permet \u00e0 un attaquant distant d&rsquo;ex\u00e9cuter des commandes arbitraires sur le syst\u00e8me de la victime<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_citadela_custom_class":"","footnotes":""},"categories":[15],"tags":[],"class_list":["post-3325","post","type-post","status-publish","format-standard","hentry","category-securite"],"_links":{"self":[{"href":"https:\/\/destinationcyber.com\/index.php?rest_route=\/wp\/v2\/posts\/3325","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/destinationcyber.com\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/destinationcyber.com\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/destinationcyber.com\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/destinationcyber.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=3325"}],"version-history":[{"count":0,"href":"https:\/\/destinationcyber.com\/index.php?rest_route=\/wp\/v2\/posts\/3325\/revisions"}],"wp:attachment":[{"href":"https:\/\/destinationcyber.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=3325"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/destinationcyber.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=3325"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/destinationcyber.com\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=3325"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}