RealPlayer Skin File Remote Buffer Overflow

High Nessus Plugin ID 15789


The remote Windows application is affected by a remote buffer overflow.


According to its build number, the installed version of RealPlayer / RealOne Player for Windows may allow an attacker to execute arbitrary code on the remote host, with the privileges of the user running RealPlayer because of an overflow vulnerability in the third-party compression library 'DUNZIP32.DLL'.

To do so, an attacker would need to send a corrupted skin file (.RJS) to a remote user and have him open it using RealPlayer.


Upgrade according to the vendor advisory referenced above.

See Also

Plugin Details

Severity: High

ID: 15789

File Name: realplayer_skin_remote_overflow.nasl

Version: $Revision: 1.21 $

Type: local

Agent: windows

Family: Windows

Published: 2004/11/23

Modified: 2016/11/02

Dependencies: 20183

Risk Information

Risk Factor: High


Base Score: 9.3

Temporal Score: 8.1

Vector: CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C

Temporal Vector: CVSS2#E:ND/RL:OF/RC:C

Vulnerability Information

CPE: cpe:/a:realnetworks:realplayer

Required KB Items: SMB/RealPlayer/Product, SMB/RealPlayer/Build

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 2004/10/27

Vulnerability Publication Date: 2004/10/27

Reference Information

CVE: CVE-2004-1094

BID: 11555

OSVDB: 19906