Vulnerability Assessment & Network Security Forums
If through a vulnerability assessment, a network security issue is detected for the vulnerability below, applying the appropriate security patches in a timely matter is very important. If you have detected that your system has already been compromised, following CERT's Network Security recovery document will assist with recommended steps for system recovery.
Vulnerability Assessment Details
Checks for multiple vulnerabilities in RealPlayer / RealOne Player for Windows
Detailed Explanation for this Vulnerability Assessment
The remote Windows application is affected by multiple
According to its version number, the installed version of RealPlayer /
RealOne Player for Windows is prone to several vulnerabilities :
- A malicious MP3 file can be used to overwrite an arbitrary
file or execute an ActiveX control.
- Using a specially-crafted RealMedia file, a possible hacker may
be able to cause a heap overflow and run arbitrary code
within the context of the affected application.
- Using a specially-crafted AVI file, a possible hacker may
be able to cause a buffer overflow and run arbitrary
code within the context of the affected application.
- A malicious website may be able to cause a local HTML
file to be created that triggers an RM file to play
which would then reference the local HTML file.
See also :
Upgrade according to the vendor advisory referenced above.
Network Security Threat Level:
High / CVSS Base Score : 7
Networks Security ID: 13530, 14048, 14073
Vulnerability Assessment Copyright: This script is Copyright (C) 2005 Tenable Network Security
|HP BL460c G8 16-Core Blade Server 2x E5-2670 2.6GHz 256GB 2x 400GB SAS SSD
|Dell R720xd 24-Core Server 2x E5-2697 v2 2.7GHz 32GB 12x 8TB 3.5in Rails RPS
|HP BL460c G8 16-Core Blade Server 2x E5-2670 2.6GHz 32GB
|Dell R620 8-Core Server 2x E5-2643 3.3GHz 128GB 10 Bay H710 iDRAC Rails RPS
No Discussions have been posted on this vulnerability.