EEye Digital Security has uncovered new security holes affecting a wide range of RealNetworks' media players.
The flaws could be exploited via a malicious web page or a RealMedia file run from a local drive to take over a user's system or delete files, according to RealNetworks.
By submitting your personal information, you agree that TechTarget and its partners may contact you regarding relevant content, products and special offers.
Researchers have turned up a myriad of serious security flaws in client software over the past few weeks, and such bugs can be difficult to patch because of the sheer number of desktops in use.
Recently, vulnerabilities have been revealed in WinAmp, WinZip and Apple Computer's iChat messaging program. A vulnerability in the way Windows software decodes Jpeg images has already been exploited by specially crafted pictures.
RealPlayer itself was hit by serious bugs in February and June.
The most serious of the three new bugs involves malformed calls, and could be exploited via a player embedded in a malicious site to execute arbitrary code. This bug affects RealPlayer versions 10, 10.5, as well as RealOne Player v1 and v2 on Windows.
A second bug could also allow malicious code execution, but only via a local RM file, RealNetworks said. The bug affects several versions of RealPlayer and RealOne Player on Windows, Mac OS X and Linux.
The third bug allows a malicious website and malicious media files to delete files on a user's PC, if the attacker knows where the files are located. This bug affects RealPlayer versions 10, 10.5, as well as RealOne Player v1 and v2 on Windows.
In an advisory, RealNetworks said it has received no reports of attacks using these vulnerabilities, but has issued patches for the affected software. Danish security firm Secunia gave the bugs a "highly critical" ranking.
Matthew Broersma writes for Techworld.com