RealPlayer for Linux, Mac, and Windows Remote Overflows

medium Nessus Network Monitor Plugin ID 3485

Synopsis

The remote Windows application is affected by several overflow vulnerabilities.

Description

The installed version of RealPlayer on the remote host is prone to buffer overflow vulnerabilities. An attacker may be able to leverage these issues to execute arbitrary code on the remote host subject to the permissions of the user running the affected application. Note that a user doesn't necessarily need to explicitly access a malicious media file since the browser may automatically pass the file to the RealPlayer application.

Solution

Upgrade or patch according to vendor recommendations.

See Also

http://service.real.com/realplayer/security/03162006_player/en

Plugin Details

Severity: Medium

ID: 3485

Family: Web Clients

Published: 3/23/2006

Updated: 3/6/2019

Risk Information

VPR

Risk Factor: Medium

Score: 6.7

CVSS v2

Risk Factor: Medium

Base Score: 5.4

Temporal Score: 4.2

Vector: CVSS2#AV:A/AC:M/Au:N/C:P/I:P/A:P

CVSS v3

Risk Factor: Medium

Base Score: 5

Temporal Score: 4.5

Vector: CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L

Temporal Vector: CVSS:3.0/E:P/RL:O/RC:C

Vulnerability Information

CPE: cpe:/a:realnetworks:realplayer

Reference Information

CVE: CVE-2005-2922, CVE-2006-0323, CVE-2006-1370

BID: 17202