RealPlayer for Linux, Mac, and Windows Remote Overflows

Medium Nessus Network Monitor Plugin ID 3485

Synopsis

The remote Windows application is affected by several overflow vulnerabilities.

Description

The installed version of RealPlayer on the remote host is prone to buffer overflow vulnerabilities. An attacker may be able to leverage these issues to execute arbitrary code on the remote host subject to the permissions of the user running the affected application. Note that a user doesn't necessarily need to explicitly access a malicious media file since the browser may automatically pass the file to the RealPlayer application.

Solution

Upgrade or patch according to vendor recommendations.

See Also

http://service.real.com/realplayer/security/03162006_player/en

Plugin Details

Severity: Medium

ID: 3485

Family: Web Clients

Published: 2006/03/23

Modified: 2016/01/21

Dependencies: 1735, 8314

Risk Information

Risk Factor: Medium

CVSSv2

Base Score: 5.4

Temporal Score: 4.2

Vector: CVSS2#AV:A/AC:M/Au:N/C:P/I:P/A:P

Temporal Vector: CVSS2#E:POC/RL:OF/RC:C

CVSSv3

Base Score: 5

Temporal Score: 4.5

Vector: CVSS3#AV:A/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L

Temporal Vector: CVSS3#E:P/RL:O/RC:C

Vulnerability Information

CPE: cpe:/a:realnetworks:realplayer

Reference Information

CVE: CVE-2006-1370, CVE-2006-0323, CVE-2005-2922

BID: 17202