TUCoPS :: Web :: Apps :: rserver5.htm

RealNetworks RealServer 7 Denial of Service
Vulnerability

    Real Server

Affected

    - Real Networks Real Server 7 Linuxc6
    - Real Networks Real Server 7 Solaris 2.6
    - Real Networks Real Server 7 Solaris 2.7
    - Real Networks Real Server 7 Solaris 2.8
    - Real Networks Real Server 7 Windows NT/2000
    - Real Networks Real Server 7 SGI Irix 6.2
    - Real Networks Real Server 7 SGI Irix 6.5
    - Real Networks Real Server 7 SCO Unixware 7.xx
    - Real Networks Real Server 7 FreeBSD 3.0
    - Real Networks Real Server 7.01 Linuxc6
    - Real Networks Real Server 7.01 Solaris 2.6
    - Real Networks Real Server 7.01 Solaris 2.7
    - Real Networks Real Server 7.01 Solaris 2.8
    - Real Networks Real Server 7.01 Windows NT/2000
    - Real Networks Real Server 7.01 SGI Irix 6.2
    - Real Networks Real Server 7.01 SGI Irix 6.5
    - Real Networks Real Server 7.01 SCO Unixware 7.xx
    - Real Networks Real Server 7.01 FreeBSD 3.0
    - Real Networks Real Server 8.00Beta Solaris7
    - Real Networks Real Server G2 1.0

Description

    The Ussr Labs team has recently discovered a memory problem in the
    RealServer 7 Server (patched  and non-patched).  What  happens is,
    by performing  an attack  sending specially-malformed  information
    to  the  RealServer  HTTP  Port(default  is  8080),  the   process
    containing the services will stop responding.

    The exploit will take down  the RealServer causing it to  stop all
    streaming  media  brodcasts,  making  it  non-functional,  (untill
    Reboot).  With  the RealServer server  running on 'Port'  (default
    being 8080) the syntax to do the D.O.S. attack is:

        http://ServerIp:Port/viewsource/template.html?

    and Real Server will Stop Responding.

    With the RealServer server running on 'Port' (default being  8080)
    the syntax to do the D.O.S. attack is:

        http://ServerIp:Port/viewsource/template.html?

    and Real Server will Stop Responding.

    Radio:  British   Broadcasting  Corporation   1999  (default    in
    RealPlayer 8):

      Radio Url:
        http://playlist.broadcast.com/makeplaylist.asp?id=7708&encad=2F6164732F617564696F686967687761792F617564696F68696768776179325F3238

        RealServer http running on port 80

        RealServer http ip: 206.190.42.7

      Valid Url for Clip Source:
        http://206.190.42.7/viewsource/template.html?nuyhtgs0pdz6iqm557a6i9bgj054ngdnbfzgro7zxfAjq357lnwEC6ne8s5ge5hi4ejqC1t6x1amngaAmkyf59v6zgjqC1t6x1amngoAmkyf1AvuEfhe640hBh60EeADAo2097qglh

      Malformed Url for Clip Source:
        http://206.190.42.7/viewsource/template.html?

    This same DoS appears to work on the new realserver 8 BETA.
Solution

    This particular exploit utilizes a bug in the URL parsing for  the
    ViewSource feature.  View  Source allows source content  and media
    file information on enabled RealServers  to be displayed in a  Web
    browser.   The  server's  auto-restart  feature  will successfully
    determine that a problem has occurred and will restart the  server
    in approximately 120 seconds.

    By taking either of the following steps, RealServer will no longer
    be susceptible:

    1. You can "turn off" view  source via the Admin System by  taking
       the following steps:
       a) In RealSystem Administrator,  click View Source, then  click
          Source Access
       b) In the Master Settings area, select "Disable View Source"

       Or  manually  add  the  following  view  source section to your
       configuration file:

        <!-- V I E W  S O U R C E -->
        <List Name="ViewSourceConfiguration">
                        <Var ViewSourceLongName="View Source Tag FileSystem"/>
                        <Var AllowViewSource="0"/>
        </List>

       Using the Admin System will NOT require a restart of RealServer
       for setting to take affect

    2. Remove  vsrcplin.so.6.0  or  vsrc3260.dll  from  the    Plugins
       directory of the server to disable viewsource.

    3. Remove  <Var  Path_4="/viewsource"/>  from the  HTTPDeliverable
       section of the config file to disable viewsource.

    All of these steps have no effect on the servers ability to stream
    all existing on-demand and live content.  It should be noted  that
    the 6.x series does not have the 'viewsource' variable  available,
    so it's undoubtedly unaffected.

TUCoPS is optimized to look best in Firefox® on a widescreen monitor (1440x900 or better).
Site design & layout copyright © 1986-2024 AOH