RealPlayer for Windows < Build Multiple Remote Code Execution Vulnerabilities

This script is Copyright (C) 2011-2016 Tenable Network Security, Inc.

Synopsis :

A multimedia application on the remote Windows host can be abused to
execute arbitrary code.

Description :

According to its build number, the installed version of RealPlayer on
the remote Windows host is affected by multiple code execution
vulnerabilities :

- A heap corruption vulnerability when processing AVI
headers. (CVE-2010-4393)

- A flaw exists in the temporary file naming scheme used
for storage which can be combined with the
OpenURLinPlayerBrowser function to execute arbitrary
code. (CVE-2011-0694)

See also :

Solution :

Upgrade to RealPlayer (Build or later.

Risk factor :

High / CVSS Base Score : 9.3
CVSS Temporal Score : 6.9
Public Exploit Available : false

Family: Windows

Nessus Plugin ID: 51814 ()

Bugtraq ID: 46047

CVE ID: CVE-2010-4393

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now