Members
  • Total Members: 14197
  • Latest: Levine
Stats
  • Total Posts: 43431
  • Total Topics: 16526
  • Online today: 2962
  • Online ever: 51419
  • (01. January 2010., 10:27:49)
Users Online
Users: 2
Guests: 2927
Total: 2929









Post reply

Name:
Email:
Subject:
Message icon:

Verification:
Type the letters shown in the picture
Listen to the letters / Request another image

Type the letters shown in the picture:
Second Anti-Bot trap, type or simply copy-paste below (only the red letters):www.codekids.ba:

shortcuts: hit alt+s to submit/post or alt+p to preview


Topic Summary

Posted by: Samker
« on: 06. February 2009., 22:31:39 »



A serious flaw in the RealPlayer media player from RealNetworks could allow an attacker to take control of a victim PC if you open a poisoned movie file, or even just preview it in Windows Explorer, according to a new notice from Fortinet.

The hole in RealPlayer 11 involves the way the program processes Internet Video Recording, or IVR, files. And according to the notice, you wouldn't have to actually open a downloaded, malicious movie to get hit: "A successful attack could take place by merely previewing the IVR file through Windows Explorer."

No word on real-world attacks, thankfully, but there's also no mention of an available patch from RealNetworks. So you can either be extra careful with movie file downloads or uninstall RealPlayer until there's a fix. I'll update this post if I hear back from RealNetworks about any available patch or workaround.

Also, if you use Firefox, be sure you've picked up the 3.0.6 update released earlier this week. Along with stability fixes, the update closes six security holes, one of which could allow an attacker to remotely install malicious software. Click Help | Check for Updates to make sure you've got the fix.

(PC World)

Enter your email address to receive daily email with 'SCforum.info - Samker's Computer Forum' newest content:

Kursevi programiranja za ucenike u Sarajevu

Terms of Use | Privacy Policy | Advertising
TinyPortal 2.3.1 © 2005-2023