CVSS2
Attack Vector
NETWORK
Attack Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:N/AC:M/Au:N/C:C/I:C/A:C
AI Score
Confidence
Low
EPSS
Percentile
97.5%
RealNetworks RealPlayer 11.0 through 11.1, SP 1.0 through 1.1.5, and 14.0.0 through 14.0.1, and Enterprise 2.0 through 2.1.4, uses predictable names for temporary files, which allows remote attackers to conduct cross-domain scripting attacks and execute arbitrary code via the OpenURLinPlayerBrowser function.
Vendor | Product | Version | CPE |
---|---|---|---|
realnetworks | realplayer | 11.0 | cpe:2.3:a:realnetworks:realplayer:11.0:*:*:*:*:*:*:* |
realnetworks | realplayer | 11.1 | cpe:2.3:a:realnetworks:realplayer:11.1:*:*:*:*:*:*:* |
realnetworks | realplayer | 14.0.0 | cpe:2.3:a:realnetworks:realplayer:14.0.0:*:*:*:*:*:*:* |
realnetworks | realplayer | 14.0.1 | cpe:2.3:a:realnetworks:realplayer:14.0.1:*:*:*:*:*:*:* |
realnetworks | realplayer_sp | 1.0.0 | cpe:2.3:a:realnetworks:realplayer_sp:1.0.0:*:*:*:*:*:*:* |
realnetworks | realplayer_sp | 1.0.1 | cpe:2.3:a:realnetworks:realplayer_sp:1.0.1:*:*:*:*:*:*:* |
realnetworks | realplayer_sp | 1.0.2 | cpe:2.3:a:realnetworks:realplayer_sp:1.0.2:*:*:*:*:*:*:* |
realnetworks | realplayer_sp | 1.0.5 | cpe:2.3:a:realnetworks:realplayer_sp:1.0.5:*:*:*:*:*:*:* |
realnetworks | realplayer_sp | 1.1 | cpe:2.3:a:realnetworks:realplayer_sp:1.1:*:*:*:*:*:*:* |
realnetworks | realplayer_sp | 1.1.1 | cpe:2.3:a:realnetworks:realplayer_sp:1.1.1:*:*:*:*:*:*:* |
docs.real.com/docs/security/SecurityUpdate020811RPE.pdf
osvdb.org/70849
secunia.com/advisories/43268
securityreason.com/securityalert/8098
service.real.com/realplayer/security/02082011_player/en/
www.securityfocus.com/archive/1/516318/100/0/threaded
www.securitytracker.com/id?1025058
www.zerodayinitiative.com/advisories/ZDI-11-076