RealPlayer Multiple Remote Overflows (2005-03-01)

High Nessus Plugin ID 17254


The remote Windows application is affected by several remote overflows.


According to its build number, the installed version of RealPlayer / RealOne Player / RealPlayer Enterprise for Windows might allow an attacker to execute arbitrary code and delete arbitrary files on the remote host.

To exploit these flaws, an attacker would send a malformed SMIL or WAV file to a user on the remote host and wait for him to open it.


Upgrade according to the vendor advisories referenced above.

See Also

Plugin Details

Severity: High

ID: 17254

File Name: realplayer_multiple_vulns.nasl

Version: $Revision: 1.17 $

Type: local

Agent: windows

Family: Windows

Published: 2005/03/02

Modified: 2013/11/27

Dependencies: 20183

Risk Information

Risk Factor: High


Base Score: 9.3

Temporal Score: 7.3

Vector: CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C

Temporal Vector: CVSS2#E:POC/RL:OF/RC:C

Vulnerability Information

CPE: cpe:/a:realnetworks:realplayer

Required KB Items: SMB/RealPlayer/Product, SMB/RealPlayer/Build

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 2005/03/01

Vulnerability Publication Date: 2005/03/01

Exploitable With

Metasploit (RealNetworks RealPlayer SMIL Buffer Overflow)

Reference Information

CVE: CVE-2005-0455, CVE-2005-0611

BID: 12697, 12698

OSVDB: 14305, 14306