![]() |
Home ▼ Bookkeeping
Online ▼ Security
Audits ▼
Managed
DNS ▼
About
Order
FAQ
Acceptable Use Policy
Dynamic DNS Clients
Configure Domains Dyanmic DNS Update Password Network
Monitor ▼
Enterprise Package
Advanced Package
Standard Package
Free Trial
FAQ
Price/Feature Summary
Order/Renew
Examples
Configure/Status Alert Profiles | ||
CVE ID: | CVE-2012-4987 |
Description: | Stack-based buffer overflow in RealNetworks RealPlayer 15.0.5.109 allows user-assisted remote attackers to execute arbitrary code via a crafted ZIP file that triggers incorrect processing of long pathnames by the Watch Folders feature. |
Test IDs: | 1.3.6.1.4.1.25623.1.0.803043 |
Cross References: |
Common Vulnerability Exposure (CVE) ID: CVE-2012-4987 BugTraq ID: 56324 http://www.securityfocus.com/bid/56324 http://seclists.org/fulldisclosure/2012/Oct/189 http://packetstormsecurity.org/files/117691/Realplayer-Watchfolders-Long-Filepath-Overflow.html http://www.reactionpenetrationtesting.co.uk/realplayer-watchfolders.html http://osvdb.org/86721 XForce ISS Database: realplayer-watch-folder-bo(79663) https://exchange.xforce.ibmcloud.com/vulnerabilities/79663 |