====================================================================== 

                     Secunia Research 09/04/2012

 - RealNetworks Helix Server Credentials Disclosure Security Issue -

====================================================================== 
Table of Contents

Affected Software....................................................1
Severity.............................................................2
Vendor's Description of Software.....................................3
Description of Vulnerability.........................................4
Solution.............................................................5
Time Table...........................................................6
Credits..............................................................7
References...........................................................8
About Secunia........................................................9
Verification........................................................10

====================================================================== 
1) Affected Software 

* RealNetworks Helix Server version 14.2.0.212.

NOTE: Other versions may also be affected.

====================================================================== 
2) Severity 

Rating: Less critical
Impact: Exposure of sensitive information
Where:  Local system

====================================================================== 
3) Vendor's Description of Software 

"Helix Server Standard delivers Flash, H.264, MPEG-4 (MP4), QuickTime,
MP3 and RealVideo content to PCs at the enterprise-level, and includes
features such as Flash Dynamic Streaming, Live Broadcasting,
Server-Side Playlists, Bookmarking, and Custom Logging and Multiple
Platform OS Support."

Product Link:
http://www.realnetworks.com/helix/

====================================================================== 
4) Description of Vulnerability

Secunia Research has discovered a security issue in RealNetworks Helix
Server, which can be exploited by malicious, local users to disclose
sensitive information.

The security issue is caused due to the user and administrative
credentials being insecurely stored in the flat file database
(\Program Files\Real\Helix Server\adm_b_db\users\). This can be
exploited by local users to disclose the clear text passwords.

====================================================================== 
5) Solution 

Update to version 14.3.x and follow the fix instructions.

====================================================================== 
6) Time Table 

26/07/2011 - Vendor notified.
29/07/2011 - Vendor response.
09/04/2012 - Coordinated Disclosure.

====================================================================== 
7) Credits 

Discovered by Dmitriy Pletnev, Secunia Research.

====================================================================== 
8) References

The Common Vulnerabilities and Exposures (CVE) project has assigned
CVE-2012-1923 for the security issue.

====================================================================== 
9) About Secunia

Secunia offers vulnerability management solutions to corporate
customers with verified and reliable vulnerability intelligence
relevant to their specific system configuration:

http://secunia.com/advisories/business_solutions/

Secunia also provides a publicly accessible and comprehensive advisory
database as a service to the security community and private 
individuals, who are interested in or concerned about IT-security.

http://secunia.com/advisories/

Secunia believes that it is important to support the community and to
do active vulnerability research in order to aid improving the 
security and reliability of software in general:

http://secunia.com/secunia_research/

Secunia regularly hires new skilled team members. Check the URL below
to see currently vacant positions:

http://secunia.com/corporate/jobs/

Secunia offers a FREE mailing list called Secunia Security Advisories:

http://secunia.com/advisories/mailing_lists/

====================================================================== 
10) Verification 

Please verify this advisory by visiting the Secunia website:
http://secunia.com/secunia_research/2012-8/

Complete list of vulnerability reports published by Secunia Research:
http://secunia.com/secunia_research/

======================================================================

_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

Reply via email to