This script is Copyright (C) 2011-2016 Tenable Network Security, Inc.
A multimedia application on the remote Windows host can be abused to
execute arbitrary code.
According to its build number, the installed version of RealPlayer on
the remote Windows host is affected by multiple code execution
- A heap corruption vulnerability when processing AVI
- A flaw exists in the temporary file naming scheme used
for storage which can be combined with the
OpenURLinPlayerBrowser function to execute arbitrary
See also :
Upgrade to RealPlayer 220.127.116.113 (Build 18.104.22.1683) or later.
Risk factor :
High / CVSS Base Score : 9.3
CVSS Temporal Score : 6.9
Public Exploit Available : false