Lucene search

K

RealNetworks RealPlayer Denial of Service Vulnerability (Jul 2013) - Windows

🗓️ 17 Jul 2013 00:00:00Reported by Copyright (C) 2013 Greenbone AGType 
openvas
 openvas
🔗 plugins.openvas.org👁 18 Views

RealNetworks RealPlayer Denial of Service Vulnerability (Jul 2013) - Windows. Successful exploitation allows remote attackers to cause denial of service condition via crafted HTML file. RealPlayer versions 16.0.2.32 and prior on Windows are affected. Flaw within the unknown function of the component HTML Handler

Show more

AI Insights are available for you today

Leverage the power of AI to quickly understand vulnerabilities, impacts, and exploitability

Related
Refs
Code
ReporterTitlePublishedViews
Family
Cvelist
CVE-2013-3299
6 Jul 201310:00
cvelist
Prion
Hardcoded credentials
6 Jul 201313:57
prion
OpenVAS
RealNetworks RealPlayer Denial of Service Vulnerability - July13 (Windows)
17 Jul 201300:00
openvas
Packet Storm
Real Player 16.0.2.32 Resource Exhaustion
2 Jul 201300:00
packetstorm
CVE
CVE-2013-3299
6 Jul 201313:57
cve
NVD
CVE-2013-3299
6 Jul 201313:57
nvd
seebug.org
Real Player <= 16.0.2.32 资源耗尽漏洞
5 Jul 201300:00
seebug
# SPDX-FileCopyrightText: 2013 Greenbone AG
# Some text descriptions might be excerpted from (a) referenced
# source(s), and are Copyright (C) by the respective right holder(s).
#
# SPDX-License-Identifier: GPL-2.0-only

if(description)
{
  script_oid("1.3.6.1.4.1.25623.1.0.803910");
  script_version("2024-02-08T14:36:53+0000");
  script_cve_id("CVE-2013-3299");
  script_tag(name:"cvss_base", value:"4.3");
  script_tag(name:"cvss_base_vector", value:"AV:N/AC:M/Au:N/C:N/I:N/A:P");
  script_tag(name:"last_modification", value:"2024-02-08 14:36:53 +0000 (Thu, 08 Feb 2024)");
  script_tag(name:"creation_date", value:"2013-07-17 16:46:46 +0530 (Wed, 17 Jul 2013)");
  script_name("RealNetworks RealPlayer Denial of Service Vulnerability (Jul 2013) - Windows");

  script_tag(name:"impact", value:"Successful exploitation allows remote attackers to cause denial of service
  condition via crafted HTML file.");

  script_tag(name:"affected", value:"RealPlayer versions 16.0.2.32 and prior on Windows.");

  script_tag(name:"insight", value:"Flaw within the unknown function of the component HTML Handler.");

  script_tag(name:"solution", value:"No known solution was made available for at least one year since
  the disclosure of this vulnerability. Likely none will be provided anymore. General solution options
  are to upgrade to a newer release, disable respective features, remove the product or replace the
  product by another one.");

  script_tag(name:"vuldetect", value:"Checks if a vulnerable version is present on the target host.");

  script_tag(name:"summary", value:"RealPlayer is prone to a denial of service (DoS) vulnerability.");

  script_tag(name:"qod_type", value:"registry");
  script_tag(name:"solution_type", value:"WillNotFix");

  script_xref(name:"URL", value:"http://securitytracker.com/id/1028732");
  script_xref(name:"URL", value:"http://www.securityfocus.com/bid/60903");
  script_xref(name:"URL", value:"http://seclists.org/bugtraq/2013/Jul/18");
  script_category(ACT_GATHER_INFO);
  script_copyright("Copyright (C) 2013 Greenbone AG");
  script_family("Denial of Service");
  script_dependencies("gb_realplayer_detect_win.nasl");
  script_mandatory_keys("RealPlayer/Win/Ver");
  exit(0);
}

include("version_func.inc");

rpVer = get_kb_item("RealPlayer/Win/Ver");
if(!rpVer){
  exit(0);
}

if(version_is_less_equal(version:rpVer, test_version:"16.0.2.32"))
{
  security_message( port: 0, data: "The target host was found to be vulnerable" );
  exit(0);
}

Transform Your Security Services

Elevate your offerings with Vulners' advanced Vulnerability Intelligence. Contact us for a demo and discover the difference comprehensive, actionable intelligence can make in your security strategy.

Book a live demo
17 Jul 2013 00:00Current
6.5Medium risk
Vulners AI Score6.5
CVSS24.3
EPSS0.06507
18
.json
Report