Vulnerabilities > CVE-2011-0694 - Unspecified vulnerability in Realnetworks Realplayer and Realplayer SP
Attack vector
UNKNOWN Attack complexity
UNKNOWN Privileges required
UNKNOWN Confidentiality impact
UNKNOWN Integrity impact
UNKNOWN Availability impact
UNKNOWN realnetworks
nessus
Summary
RealNetworks RealPlayer 11.0 through 11.1, SP 1.0 through 1.1.5, and 14.0.0 through 14.0.1, and Enterprise 2.0 through 2.1.4, uses predictable names for temporary files, which allows remote attackers to conduct cross-domain scripting attacks and execute arbitrary code via the OpenURLinPlayerBrowser function.
Vulnerable Configurations
Nessus
NASL family | Windows |
NASL id | REALPLAYER_12_0_1_633.NASL |
description | According to its build number, the installed version of RealPlayer on the remote Windows host is affected by multiple code execution vulnerabilities : - A heap corruption vulnerability when processing AVI headers. (CVE-2010-4393) - A flaw exists in the temporary file naming scheme used for storage which can be combined with the OpenURLinPlayerBrowser function to execute arbitrary code. (CVE-2011-0694) |
last seen | 2020-06-01 |
modified | 2020-06-02 |
plugin id | 51814 |
published | 2011-01-28 |
reporter | This script is Copyright (C) 2011-2018 Tenable Network Security, Inc. |
source | https://www.tenable.com/plugins/nessus/51814 |
title | RealPlayer for Windows < Build 12.0.1.633 Multiple Remote Code Execution Vulnerabilities |
code |
|
References
- http://docs.real.com/docs/security/SecurityUpdate020811RPE.pdf
- http://osvdb.org/70849
- http://secunia.com/advisories/43268
- http://securityreason.com/securityalert/8098
- http://service.real.com/realplayer/security/02082011_player/en/
- http://www.securityfocus.com/archive/1/516318/100/0/threaded
- http://www.securitytracker.com/id?1025058
- http://www.zerodayinitiative.com/advisories/ZDI-11-076
- http://docs.real.com/docs/security/SecurityUpdate020811RPE.pdf
- http://www.zerodayinitiative.com/advisories/ZDI-11-076
- http://www.securitytracker.com/id?1025058
- http://www.securityfocus.com/archive/1/516318/100/0/threaded
- http://service.real.com/realplayer/security/02082011_player/en/
- http://securityreason.com/securityalert/8098
- http://secunia.com/advisories/43268
- http://osvdb.org/70849