Lucene search

K
cve[email protected]CVE-2011-1426
HistoryApr 18, 2011 - 6:55 p.m.

CVE-2011-1426

2011-04-1818:55:01
web.nvd.nist.gov
27
cve-2011-1426
realnetworks
realplayer
remote code execution
security vulnerability

7.6 High

AI Score

Confidence

Low

9.3 High

CVSS2

Access Vector

Access Complexity

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:M/Au:N/C:C/I:C/A:C

0.406 Medium

EPSS

Percentile

97.3%

The OpenURLInDefaultBrowser method in RealNetworks RealPlayer 11.0 through 11.1 and 14.0.0 through 14.0.2, and RealPlayer SP 1.0 through 1.1.5, launches a default handler for the filename specified in the first argument, which allows remote attackers to execute arbitrary code via a .rnx filename corresponding to a crafted RNX file.

Affected configurations

NVD
Node
realnetworksrealplayerMatch11.0
OR
realnetworksrealplayerMatch11.1
Node
realnetworksrealplayerMatch14.0.0
OR
realnetworksrealplayerMatch14.0.1
OR
realnetworksrealplayerMatch14.0.2
Node
realnetworksrealplayer_spMatch1.0.0
OR
realnetworksrealplayer_spMatch1.0.1
OR
realnetworksrealplayer_spMatch1.0.2
OR
realnetworksrealplayer_spMatch1.0.5
OR
realnetworksrealplayer_spMatch1.1
OR
realnetworksrealplayer_spMatch1.1.1
OR
realnetworksrealplayer_spMatch1.1.2
OR
realnetworksrealplayer_spMatch1.1.3
OR
realnetworksrealplayer_spMatch1.1.4
OR
realnetworksrealplayer_spMatch1.1.5

7.6 High

AI Score

Confidence

Low

9.3 High

CVSS2

Access Vector

Access Complexity

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:M/Au:N/C:C/I:C/A:C

0.406 Medium

EPSS

Percentile

97.3%