RealPlayer Multiple Remote Overflows (2005-03-01)

high Nessus Plugin ID 17254

Synopsis

The remote Windows application is affected by several remote overflows.

Description

According to its build number, the installed version of RealPlayer / RealOne Player / RealPlayer Enterprise for Windows might allow an attacker to execute arbitrary code and delete arbitrary files on the remote host.

To exploit these flaws, an attacker would send a malformed SMIL or WAV file to a user on the remote host and wait for him to open it.

Solution

Upgrade according to the vendor advisories referenced above.

See Also

http://www.nessus.org/u?aec48939

https://www.securityfocus.com/archive/1/391959

http://service.real.com/help/faq/security/050224_player/EN/

Plugin Details

Severity: High

ID: 17254

File Name: realplayer_multiple_vulns.nasl

Version: 1.21

Type: local

Agent: windows

Family: Windows

Published: 3/2/2005

Updated: 11/15/2018

Supported Sensors: Nessus Agent, Nessus

Risk Information

VPR

Risk Factor: High

Score: 8.5

CVSS v2

Risk Factor: High

Base Score: 9.3

Temporal Score: 8.1

Vector: CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C

Vulnerability Information

CPE: cpe:/a:realnetworks:realplayer

Required KB Items: SMB/RealPlayer/Product, SMB/RealPlayer/Build

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 3/1/2005

Vulnerability Publication Date: 3/1/2005

Exploitable With

Metasploit (RealNetworks RealPlayer SMIL Buffer Overflow)

Reference Information

CVE: CVE-2005-0455, CVE-2005-0611

BID: 12697, 12698