RealNetworks has released a software patch that it says finally fixes highly publicised security holes in its RealOne Player.
The patch closes nine security holes that could allow an attacker to take over a computer running the RealOne Player, according to RealNetworks.
The vulnerabilities, described as "buffer overruns", were first discovered in November by Mark Litchfield, a British security researcher for Next Generation Security Software. In buffer overrun attacks, malicious hackers can exploit an unchecked buffer in a program to load and run their code on the vulnerable system.
Litchfield promptly reported the problems he found to RealNetworks.
In order to be vulnerable to an attack that took advantage of the flaws, users first would have to be tricked by attackers into downloading a malformed file. RealNetworks said in its statement that no exploitations of the security holes have yet been reported.
Nevertheless, RealNetworks issued a patch for the vulnerabilities in late November.
"All security vulnerabilities are taken very seriously by RealNetworks," said the company in its statement on Wednesday.
But Litchfield said he was able to prove that the patch issued by RealNetworks did not solve the reported security problems.
The mix-up prompted RealNetworks to announce a wholesale review of its RealOne Player source code to identify any other vulnerabilities in the product.
Although the results of that audit were not mentioned in the company's statement, it says the nine holes have been plugged.
RealOne Player users can obtain the update by selecting the Check for Updates option on the RealOne Player's tools menu, or by downloading the software patch here.