ID CVE-2011-1426
Summary The OpenURLInDefaultBrowser method in RealNetworks RealPlayer 11.0 through 11.1 and 14.0.0 through 14.0.2, and RealPlayer SP 1.0 through 1.1.5, launches a default handler for the filename specified in the first argument, which allows remote attackers to execute arbitrary code via a .rnx filename corresponding to a crafted RNX file.
References
Vulnerable Configurations
  • cpe:2.3:a:realnetworks:realplayer:11.0:*:*:*:*:*:*:*
    cpe:2.3:a:realnetworks:realplayer:11.0:*:*:*:*:*:*:*
  • cpe:2.3:a:realnetworks:realplayer:11.1:*:*:*:*:*:*:*
    cpe:2.3:a:realnetworks:realplayer:11.1:*:*:*:*:*:*:*
  • cpe:2.3:a:realnetworks:realplayer:14.0.0:*:*:*:*:*:*:*
    cpe:2.3:a:realnetworks:realplayer:14.0.0:*:*:*:*:*:*:*
  • cpe:2.3:a:realnetworks:realplayer:14.0.1:*:*:*:*:*:*:*
    cpe:2.3:a:realnetworks:realplayer:14.0.1:*:*:*:*:*:*:*
  • cpe:2.3:a:realnetworks:realplayer:14.0.2:*:*:*:*:*:*:*
    cpe:2.3:a:realnetworks:realplayer:14.0.2:*:*:*:*:*:*:*
  • cpe:2.3:a:realnetworks:realplayer_sp:1.0.0:*:*:*:*:*:*:*
    cpe:2.3:a:realnetworks:realplayer_sp:1.0.0:*:*:*:*:*:*:*
  • cpe:2.3:a:realnetworks:realplayer_sp:1.0.1:*:*:*:*:*:*:*
    cpe:2.3:a:realnetworks:realplayer_sp:1.0.1:*:*:*:*:*:*:*
  • cpe:2.3:a:realnetworks:realplayer_sp:1.0.2:*:*:*:*:*:*:*
    cpe:2.3:a:realnetworks:realplayer_sp:1.0.2:*:*:*:*:*:*:*
  • cpe:2.3:a:realnetworks:realplayer_sp:1.0.5:*:*:*:*:*:*:*
    cpe:2.3:a:realnetworks:realplayer_sp:1.0.5:*:*:*:*:*:*:*
  • cpe:2.3:a:realnetworks:realplayer_sp:1.1:*:*:*:*:*:*:*
    cpe:2.3:a:realnetworks:realplayer_sp:1.1:*:*:*:*:*:*:*
  • cpe:2.3:a:realnetworks:realplayer_sp:1.1.1:*:*:*:*:*:*:*
    cpe:2.3:a:realnetworks:realplayer_sp:1.1.1:*:*:*:*:*:*:*
  • cpe:2.3:a:realnetworks:realplayer_sp:1.1.2:*:*:*:*:*:*:*
    cpe:2.3:a:realnetworks:realplayer_sp:1.1.2:*:*:*:*:*:*:*
  • cpe:2.3:a:realnetworks:realplayer_sp:1.1.3:*:*:*:*:*:*:*
    cpe:2.3:a:realnetworks:realplayer_sp:1.1.3:*:*:*:*:*:*:*
  • cpe:2.3:a:realnetworks:realplayer_sp:1.1.4:*:*:*:*:*:*:*
    cpe:2.3:a:realnetworks:realplayer_sp:1.1.4:*:*:*:*:*:*:*
  • cpe:2.3:a:realnetworks:realplayer_sp:1.1.5:*:*:*:*:*:*:*
    cpe:2.3:a:realnetworks:realplayer_sp:1.1.5:*:*:*:*:*:*:*
CVSS
Base: 9.3 (as of 09-10-2018 - 19:30)
Impact:
Exploitability:
CWE NVD-CWE-Other
CAPEC
Access
VectorComplexityAuthentication
NETWORK MEDIUM NONE
Impact
ConfidentialityIntegrityAvailability
COMPLETE COMPLETE COMPLETE
cvss-vector via4 AV:N/AC:M/Au:N/C:C/I:C/A:C
refmap via4
bid 47335
bugtraq 20110412 ZDI-11-122: RealNetworks RealPlayer OpenURLInDefaultBrowser Remote Code Execution Vulnerability
confirm http://service.real.com/realplayer/security/04122011_player/en/
misc http://zerodayinitiative.com/advisories/ZDI-11-122/
sectrack 1025351
vupen ADV-2011-0979
xf realplayer-openurlindefaultbrowser-code-exe(66728)
Last major update 09-10-2018 - 19:30
Published 18-04-2011 - 18:55
Last modified 09-10-2018 - 19:30
Back to Top