|
Vulnerability Assessment & Network Security Forums |
|||||||||
If through a vulnerability assessment, a network security issue is detected for the vulnerability below, applying the appropriate security patches in a timely matter is very important. If you have detected that your system has already been compromised, following CERT's Network Security recovery document will assist with recommended steps for system recovery. Home >> Browse Vulnerability Assessment Database >> Windows >> RealPlayer / RealOne Player for Windows Multiple Vulnerabilities Vulnerability Assessment Details
|
RealPlayer / RealOne Player for Windows Multiple Vulnerabilities |
||
Checks for multiple vulnerabilities in RealPlayer / RealOne Player for Windows Detailed Explanation for this Vulnerability Assessment Summary : The remote Windows application is affected by multiple vulnerabilities. Description : According to its version number, the installed version of RealPlayer / RealOne Player for Windows is prone to several vulnerabilities : - A malicious MP3 file can be used to overwrite an arbitrary file or execute an ActiveX control. - Using a specially-crafted RealMedia file, a possible hacker may be able to cause a heap overflow and run arbitrary code within the context of the affected application. - Using a specially-crafted AVI file, a possible hacker may be able to cause a buffer overflow and run arbitrary code within the context of the affected application. - A malicious website may be able to cause a local HTML file to be created that triggers an RM file to play which would then reference the local HTML file. See also : http://www.idefense.com/application/poi/display?id=250&type=vulnerabilities http://research.eeye.com/html/advisories/published/AD20050623.html http://www.securityfocus.com/archive/1/403535/30/0/threaded http://service.real.com/help/faq/security/050623_player/EN/ Solution : Upgrade according to the vendor advisory referenced above. Network Security Threat Level: High / CVSS Base Score : 7 (AV:R/AC:L/Au:NR/C:P/A:P/I:P/B:N) Networks Security ID: 13530, 14048, 14073 Vulnerability Assessment Copyright: This script is Copyright (C) 2005 Tenable Network Security |
||
Cables, Connectors |
$19.50
Intel - Core i7-12700K Desktop Processor 12 (8P+4E) Cores up to 5.0 GHz Unloc...
$242.99
Intel - Core i9-12900K Desktop Processor 16 (8P+8E) Cores up to 5.2 GHz Unloc...
$347.99
Intel - Core i9-14900K 14th Gen 24-Core 32-Thread - 4.4GHz (6.0GHz Turbo) Soc...
$544.99
Intel SR2L6 Core i5-6500 3.2GHz 6th Gen LGA1151 Socket Quad-Core Processor
$24.59
Intel 6 Core i5-8600 3.1GHZ Desktop Processor SR3X0
$50.00
Intel - Core i7-14700K 14th Gen 20-Core 28-Thread - 4.3GHz (5.6GHz Turbo) Soc...
$399.99
AMD RYZEN 7 PRO 1700 PROCESSOR | 3.00GHZ | YD170BBBM88AE
$49.99
AMD Ryzen 7 2700X CPU Processor 3.7GHz AM4
$74.99
Intel Core i9-13900K Raptor Lake 24-Core (8P+16E) Desktop Processor CPU
$499.00
|
||
No Discussions have been posted on this vulnerability. |