Computer Security
[EN] securityvulns.ru no-pyccku


RealNetworks RealPlayer code execution
Published:11.02.2011
Source:
SecurityVulns ID:11422
Type:client
Threat Level:
8/10
Description:It's possible to save and execute file.
Affected:REAL : RealPlayer Enterprise 2.1
 REALNETWORKS : Real Player 11.0
 REALNETWORKS : Real Player 12.0
 REALNETWORKS : Real Player 14.0
CVE:CVE-2011-0694 (RealNetworks RealPlayer 11.0 through 11.1, SP 1.0 through 1.1.5, and 14.0.0 through 14.0.1, and Enterprise 2.0 through 2.1.4, uses predictable names for temporary files, which allows remote attackers to conduct cross-domain scripting attacks and execute arbitrary code via the OpenURLinPlayerBrowser function.)
Original documentdocumentZDI, ZDI-11-076: RealNetworks Real Player Predictable Temporary File Remote Code Execution Vulnerability (11.02.2011)
Files:RealNetworks, Inc. Releases Update to Address Security Vulnerabilities

About | Terms of use | Privacy Policy
© SecurityVulns, 3APA3A, Vladimir Dubrovin
Nizhny Novgorod