RealPlayer Predictable Temporary File Cross Domain Scripting Vulnerability
RISK: High Risk
TYPE: Clients - Audio & Video
A vulnerability has been identified in RealPlayer, which could be exploited by remote attackers to compromise a vulnerable system. This issue is caused by an error within the temporary file naming scheme used by the application to store references to RM files, which could allow malicious web sites to predict a temporary filename and use it in combination with the "OpenURLinPlayerBrowser()" function of the RealPlayer ActiveX control to execute arbitrary code.
Impact
- Remote Code Execution
System / Technologies affected
- RealPlayer versions 11.0 through 11.1
- RealPlayer SP versions 1.0 through 1.1.5
- RealPlayer versions 14.0.0 through 14.0.1
- RealPlayer Enterprise versions 2.0 through 2.1.4
Solutions
Before installation of the software, please visit the software manufacturer web-site for more details.
- Upgrade to RealPlayer version 14.0.2 and RealPlayer Enterprise version 2.1.5.
Vulnerability Identifier
Source
Related Link
Share with