CVE-2011-0694

critical

Description

RealNetworks RealPlayer 11.0 through 11.1, SP 1.0 through 1.1.5, and 14.0.0 through 14.0.1, and Enterprise 2.0 through 2.1.4, uses predictable names for temporary files, which allows remote attackers to conduct cross-domain scripting attacks and execute arbitrary code via the OpenURLinPlayerBrowser function.

References

http://www.zerodayinitiative.com/advisories/ZDI-11-076

http://www.securitytracker.com/id?1025058

http://www.securityfocus.com/archive/1/516318/100/0/threaded

http://service.real.com/realplayer/security/02082011_player/en/

http://securityreason.com/securityalert/8098

http://secunia.com/advisories/43268

http://osvdb.org/70849

http://docs.real.com/docs/security/SecurityUpdate020811RPE.pdf

Details

Source: Mitre, NVD

Published: 2011-02-21

Updated: 2018-10-09

Risk Information

CVSS v2

Base Score: 9.3

Vector: CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C

Severity: High

CVSS v3

Base Score: 9.8

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Severity: Critical