Skip to main content

RealPlayer Predictable Temporary File Cross Domain Scripting Vulnerability

Last Update Date: 11 Feb 2011 Release Date: 10 Feb 2011 6198 Views

RISK: High Risk

TYPE: Clients - Audio & Video

TYPE: Audio & Video

A vulnerability has been identified in RealPlayer, which could be exploited by remote attackers to compromise a vulnerable system. This issue is caused by an error within the temporary file naming scheme used by the application to store references to RM files, which could allow malicious web sites to predict a temporary filename and use it in combination with the "OpenURLinPlayerBrowser()" function of the RealPlayer ActiveX control to execute arbitrary code.


Impact

  • Remote Code Execution

System / Technologies affected

  • RealPlayer versions 11.0 through 11.1
  • RealPlayer SP versions 1.0 through 1.1.5
  • RealPlayer versions 14.0.0 through 14.0.1
  • RealPlayer Enterprise versions 2.0 through 2.1.4

Solutions

Before installation of the software, please visit the software manufacturer web-site for more details.

  • Upgrade to RealPlayer version 14.0.2 and RealPlayer Enterprise version 2.1.5.

Vulnerability Identifier


Source


Related Link