RealNetworks RealPlayer Denial of Service Vulnerability (Jul 2013) - Windows. Successful exploitation allows remote attackers to cause denial of service condition via crafted HTML file. RealPlayer versions 16.0.2.32 and prior on Windows are affected. Flaw within the unknown function of the component HTML Handler
Reporter | Title | Published | Views | Family All 7 |
---|---|---|---|---|
![]() | CVE-2013-3299 | 6 Jul 201310:00 | – | cvelist |
![]() | Hardcoded credentials | 6 Jul 201313:57 | – | prion |
![]() | RealNetworks RealPlayer Denial of Service Vulnerability - July13 (Windows) | 17 Jul 201300:00 | – | openvas |
![]() | Real Player 16.0.2.32 Resource Exhaustion | 2 Jul 201300:00 | – | packetstorm |
![]() | CVE-2013-3299 | 6 Jul 201313:57 | – | cve |
![]() | CVE-2013-3299 | 6 Jul 201313:57 | – | nvd |
![]() | Real Player <= 16.0.2.32 资源耗尽漏洞 | 5 Jul 201300:00 | – | seebug |
Source | Link |
---|---|
securityfocus | www.securityfocus.com/bid/60903 |
securitytracker | www.securitytracker.com/id/1028732 |
seclists | www.seclists.org/bugtraq/2013/Jul/18 |
# SPDX-FileCopyrightText: 2013 Greenbone AG
# Some text descriptions might be excerpted from (a) referenced
# source(s), and are Copyright (C) by the respective right holder(s).
#
# SPDX-License-Identifier: GPL-2.0-only
if(description)
{
script_oid("1.3.6.1.4.1.25623.1.0.803910");
script_version("2024-02-08T14:36:53+0000");
script_cve_id("CVE-2013-3299");
script_tag(name:"cvss_base", value:"4.3");
script_tag(name:"cvss_base_vector", value:"AV:N/AC:M/Au:N/C:N/I:N/A:P");
script_tag(name:"last_modification", value:"2024-02-08 14:36:53 +0000 (Thu, 08 Feb 2024)");
script_tag(name:"creation_date", value:"2013-07-17 16:46:46 +0530 (Wed, 17 Jul 2013)");
script_name("RealNetworks RealPlayer Denial of Service Vulnerability (Jul 2013) - Windows");
script_tag(name:"impact", value:"Successful exploitation allows remote attackers to cause denial of service
condition via crafted HTML file.");
script_tag(name:"affected", value:"RealPlayer versions 16.0.2.32 and prior on Windows.");
script_tag(name:"insight", value:"Flaw within the unknown function of the component HTML Handler.");
script_tag(name:"solution", value:"No known solution was made available for at least one year since
the disclosure of this vulnerability. Likely none will be provided anymore. General solution options
are to upgrade to a newer release, disable respective features, remove the product or replace the
product by another one.");
script_tag(name:"vuldetect", value:"Checks if a vulnerable version is present on the target host.");
script_tag(name:"summary", value:"RealPlayer is prone to a denial of service (DoS) vulnerability.");
script_tag(name:"qod_type", value:"registry");
script_tag(name:"solution_type", value:"WillNotFix");
script_xref(name:"URL", value:"http://securitytracker.com/id/1028732");
script_xref(name:"URL", value:"http://www.securityfocus.com/bid/60903");
script_xref(name:"URL", value:"http://seclists.org/bugtraq/2013/Jul/18");
script_category(ACT_GATHER_INFO);
script_copyright("Copyright (C) 2013 Greenbone AG");
script_family("Denial of Service");
script_dependencies("gb_realplayer_detect_win.nasl");
script_mandatory_keys("RealPlayer/Win/Ver");
exit(0);
}
include("version_func.inc");
rpVer = get_kb_item("RealPlayer/Win/Ver");
if(!rpVer){
exit(0);
}
if(version_is_less_equal(version:rpVer, test_version:"16.0.2.32"))
{
security_message( port: 0, data: "The target host was found to be vulnerable" );
exit(0);
}
Transform Your Security Services
Elevate your offerings with Vulners' advanced Vulnerability Intelligence. Contact us for a demo and discover the difference comprehensive, actionable intelligence can make in your security strategy.
Book a live demo