RealPlayer for Windows < Build 12.0.1.633 Multiple Remote Code Execution Vulnerabilities

This script is Copyright (C) 2011-2016 Tenable Network Security, Inc.


Synopsis :

A multimedia application on the remote Windows host can be abused to
execute arbitrary code.

Description :

According to its build number, the installed version of RealPlayer on
the remote Windows host is affected by multiple code execution
vulnerabilities :

- A heap corruption vulnerability when processing AVI
headers. (CVE-2010-4393)

- A flaw exists in the temporary file naming scheme used
for storage which can be combined with the
OpenURLinPlayerBrowser function to execute arbitrary
code. (CVE-2011-0694)

See also :

http://www.zerodayinitiative.com/advisories/ZDI-11-033/
http://www.zerodayinitiative.com/advisories/ZDI-11-076/
http://seclists.org/fulldisclosure/2011/Jan/518
http://service.real.com/realplayer/security/01272011_player/en/
http://service.real.com/realplayer/security/02082011_player/en/

Solution :

Upgrade to RealPlayer 14.0.2.633 (Build 12.0.1.633) or later.

Risk factor :

High / CVSS Base Score : 9.3
(CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C)
CVSS Temporal Score : 6.9
(CVSS2#E:U/RL:OF/RC:C)
Public Exploit Available : false

Family: Windows

Nessus Plugin ID: 51814 ()

Bugtraq ID: 46047
46285

CVE ID: CVE-2010-4393
CVE-2011-0694

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now