Vulnerability   
Search   
    Search 219043 CVE descriptions
and 99761 test descriptions,
access 10,000+ cross references.
Tests   CVE   All  

Test ID:1.3.6.1.4.1.25623.1.0.801779
Category:General
Title:RealNetworks RealPlayer 'OpenURLInDefaultBrowser()' Code Execution Vulnerability (Windows)
Summary:This host is installed with RealPlayer which is prone to Code; Execution Vulnerability.
Description:Summary:
This host is installed with RealPlayer which is prone to Code
Execution Vulnerability.

Vulnerability Insight:
The flaw is caused by an error within the 'OpenURLInDefaultBrowser()' method
when processing user-supplied parameters, which could allow an attacker to
execute arbitrary code via a specially crafted '.rnx' file.

Vulnerability Impact:
Successful exploitation allows remote attackers to execute arbitrary code
within the context of the affected application. Failed attacks may cause
denial-of-service conditions.

Affected Software/OS:
RealPlayer versions 11.0 through 11.1
RealPlayer SP versions 1.0 through 1.1.5 (12.x)
RealPlayer versions 14.0.0 through 14.0.2

Solution:
Upgrade to RealPlayer version 14.0.3 or later.

CVSS Score:
9.3

CVSS Vector:
AV:N/AC:M/Au:N/C:C/I:C/A:C

Cross-Ref: BugTraq ID: 47335
Common Vulnerability Exposure (CVE) ID: CVE-2011-1426
http://www.securityfocus.com/bid/47335
Bugtraq: 20110412 ZDI-11-122: RealNetworks RealPlayer OpenURLInDefaultBrowser Remote Code Execution Vulnerability (Google Search)
http://www.securityfocus.com/archive/1/517470/100/0/threaded
http://zerodayinitiative.com/advisories/ZDI-11-122/
http://securitytracker.com/id?1025351
http://www.vupen.com/english/advisories/2011/0979
XForce ISS Database: realplayer-openurlindefaultbrowser-code-exe(66728)
https://exchange.xforce.ibmcloud.com/vulnerabilities/66728
CopyrightCopyright (C) 2011 Greenbone Networks GmbH

This is only one of 99761 vulnerability tests in our test suite. Find out more about running a complete security audit.

To run a free test of this vulnerability against your system, register below.




© 1998-2024 E-Soft Inc. All rights reserved.