Vulnerability Assessment & Network Security Forums



If through a vulnerability assessment, a network security issue is detected for the vulnerability below, applying the appropriate security patches in a timely matter is very important.  If you have detected that your system has already been compromised, following CERT's Network Security recovery document will assist with recommended steps for system recovery.


Home >> Browse Vulnerability Assessment Database >> Windows >> RealPlayer / RealOne Player for Windows Multiple Vulnerabilities


Vulnerability Assessment Details

RealPlayer / RealOne Player for Windows Multiple Vulnerabilities

Vulnerability Assessment Summary
Checks for multiple vulnerabilities in RealPlayer / RealOne Player for Windows

Detailed Explanation for this Vulnerability Assessment

Summary :

The remote Windows application is affected by multiple
vulnerabilities.

Description :

According to its version number, the installed version of RealPlayer /
RealOne Player for Windows is prone to several vulnerabilities :

- A malicious MP3 file can be used to overwrite an arbitrary
file or execute an ActiveX control.

- Using a specially-crafted RealMedia file, a possible hacker may
be able to cause a heap overflow and run arbitrary code
within the context of the affected application.

- Using a specially-crafted AVI file, a possible hacker may
be able to cause a buffer overflow and run arbitrary
code within the context of the affected application.

- A malicious website may be able to cause a local HTML
file to be created that triggers an RM file to play
which would then reference the local HTML file.

See also :

http://www.idefense.com/application/poi/display?id=250&type=vulnerabilities
http://research.eeye.com/html/advisories/published/AD20050623.html
http://www.securityfocus.com/archive/1/403535/30/0/threaded
http://service.real.com/help/faq/security/050623_player/EN/

Solution :

Upgrade according to the vendor advisory referenced above.

Network Security Threat Level:

High / CVSS Base Score : 7
(AV:R/AC:L/Au:NR/C:P/A:P/I:P/B:N)

Networks Security ID: 13530, 14048, 14073

Vulnerability Assessment Copyright: This script is Copyright (C) 2005 Tenable Network Security

Cables, Connectors

HP Renew ProLiant DL380 G9 Dual E5-2630 v4 10-Core 2.2GHz 384GB 8x 300GB SAS
$8818.0
HP Renew ProLiant DL380 G9 Dual E5-2630 v4 10-Core 2.2GHz 384GB 8x 300GB SAS picturePair of Intel Xeon E5-2640 v2 2.0GHz 8-Core CPU Processors Dell R620 sr19z
$235.0
Pair of Intel Xeon E5-2640 v2 2.0GHz 8-Core CPU Processors Dell  R620 sr19z pictureDell Latitude E6320 Laptop Parts/Repair BOOTS Core i5-2520M 8GB RAM - LCD ISSUE
$9.99
Dell Latitude E6320 Laptop Parts/Repair BOOTS Core i5-2520M 8GB RAM - LCD ISSUE pictureHP ProLiant DL385P G8 1x 16-Core AMD Opteron 6376 / 128GB DRAM Server 710725-S01
$700.0
HP ProLiant DL385P G8 1x 16-Core AMD Opteron 6376 / 128GB DRAM Server 710725-S01 picture


Discussions

No Discussions have been posted on this vulnerability.