CVE-2005-0190

high

Description

Directory traversal vulnerability in RealPlayer 10.5 (6.0.12.1040) and earlier allows remote attackers to delete arbitrary files via a Real Metadata Packages (RMP) file with a FILENAME tag containing .. (dot dot) sequences in a filename that ends with a ? (question mark) and an allowed file extension (e.g. .mp3), which bypasses the check for the file extension.

References

https://exchange.xforce.ibmcloud.com/vulnerabilities/17551

http://www.securityfocus.com/bid/11308

http://www.ngssoftware.com/advisories/real-02full.txt

http://service.real.com/help/faq/security/040928_player/EN/

http://secunia.com/advisories/12672/

http://marc.info/?l=bugtraq&m=110616160228843&w=2

http://marc.info/?l=bugtraq&m=109707741022291&w=2

Details

Source: Mitre, NVD

Published: 2004-09-29

Updated: 2024-11-20

Risk Information

CVSS v2

Base Score: 2.6

Vector: CVSS2#AV:N/AC:H/Au:N/C:N/I:P/A:N

Severity: Low

CVSS v3

Base Score: 7.5

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N

Severity: High