[原文]Stack-based buffer overflow in the RT3 plugin, as used in RealPlayer 8, RealOne Player, RealOne Player 10 beta, and RealOne Player Enterprise, allows remote attackers to execute arbitrary code via a malformed .R3T file.
A remote overflow exists in RealPlayer/RealOne R3T Plugin. The software fails to check an unspecified boundary within the handling of the R3T file format resulting in a buffer overflow. With a specially crafted request, an attacker can cause the service to stop responding, and or execute arbitrary code on the targeted host.
Currently, there are no known workarounds or upgrades to correct this issue. However, Real has released a patch to address this vulnerability.