![]() |
Home ▼ Bookkeeping
Online ▼ Security
Audits ▼
Managed
DNS ▼
About
Order
FAQ
Acceptable Use Policy
Dynamic DNS Clients
Configure Domains Dyanmic DNS Update Password Network
Monitor ▼
Enterprise Package
Advanced Package
Standard Package
Free Trial
FAQ
Price/Feature Summary
Order/Renew
Examples
Configure/Status Alert Profiles | ||
Test ID: | 1.3.6.1.4.1.25623.1.0.14278 |
Category: | Windows |
Title: | RealPlayer multiple remote overflows |
Summary: | NOSUMMARY |
Description: | Description: According to it's version number, the version of Realplayer is vulnerable to several remote overflows. Realplayer is a multimedia player. An attacker, exploiting this flaw, would need to be able to coerce a local user into visiting a malicious URL or downloading a malicious realplayer media file which, upon execution, would execute code with the privileges of the local user. Solution : See http://service.real.com/help/faq/security/ The following versions are reported to be vulnerable: Real Networks RealOne Player 6.0.11 .872 Real Networks RealOne Player 6.0.11 .868 Real Networks RealOne Player 6.0.11 .853 Real Networks RealOne Player 6.0.11 .841 Real Networks RealOne Player 6.0.11 .830 Real Networks RealOne Player 6.0.11 .818 Real Networks RealOne Player Gold for Windows 6.0.10 .505 If you have uninstalled RealPlayer you may wish to delete the old registry key at SOFTWARE\RealNetworks\RealPlayer. Risk factor : High |
Cross-Ref: |
BugTraq ID: 10934 BugTraq ID: 10518 |
Copyright | This script is Copyright (C) 2004 Tenable Network Security |
This is only one of 145615 vulnerability tests in our test suite. Find out more about running a complete security audit. To run a free test of this vulnerability against your system, register below. |