RealNetworks RealPlayer QCP Parsing Buffer Overflow Exploit Update

The specific flaw exists within qcpfformat.dll, which is responsible for parsing QCP media files. The process creates a static 256 byte allocation on the heap and trusts a user-supplied counter from the file within a memory copy loop. This version adds support for Internet Explorer 8 with java enabled.
Exploit type: 
Vulnerabilty ID: 
Released Date: 
Sunday, September 11, 2011 - 19:00