RealPlayer for Windows < Build 6.0.12.1662 Multiple Vulnerabilities

This script is Copyright (C) 2007-2016 Tenable Network Security, Inc.


Synopsis :

The remote Windows application is affected by several buffer overflow
vulnerabilities.

Description :

According to its build number, the installed version of RealPlayer /
RealOne Player / RealPlayer Enterprise on the remote Windows host
suffers from several buffer overflows involving specially crafted
media files (eg, '.mp3', '.rm', '.SMIL', '.swf', '.ram', and '.pls').
If an attacker can trick a user on the affected system into opening
such a file or browsing to a specially crafted web page, he may be
able to exploit one of these issues to execute arbitrary code subject
to the user's privileges on the affected host.

See also :

http://www.securityfocus.com/archive/1/482855/30/0/threaded
http://www.securityfocus.com/archive/1/482856/30/0/threaded
http://www.securityfocus.com/archive/1/482942/30/0/threaded
http://seclists.org/fulldisclosure/2007/Oct/922
http://seclists.org/fulldisclosure/2007/Oct/924
http://seclists.org/fulldisclosure/2007/Oct/925
http://service.real.com/realplayer/security/10252007_player/en/

Solution :

Upgrade to RealPlayer 10.5 build 6.0.12.1662 / RealPlayer Enterprise
build 6.0.11.2160 or later.

Note that the vendor's advisory states that build numbers for
RealPlayer 10.5 are not sequential.

Risk factor :

High / CVSS Base Score : 9.3
(CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C)
CVSS Temporal Score : 7.3
(CVSS2#E:POC/RL:OF/RC:C)
Public Exploit Available : true

Family: Windows

Nessus Plugin ID: 27591 ()

Bugtraq ID: 24658
26214
26284

CVE ID: CVE-2007-2263
CVE-2007-2264
CVE-2007-3410
CVE-2007-4599
CVE-2007-5080
CVE-2007-5081

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now