Lumension® Endpoint Intelligence Center

Intelligence Center » Browse All Vulnerabilities » CVE-2005-0190

Overview

Vulnerability Score 2.6 2.6
CVE Id CVE-2005-0190
Last Modified 07 Mar 2011 09:19:38
Published 29 Sep 2004 12:00:00
Confidentiality Impact NONE NONE
Integrity Impact PARTIAL PARTIAL
Availability Impact NONE NONE
Access Vector NETWORK
Access Complexity HIGH
Authentication NONE

CVE-2005-0190

Summary

Directory traversal vulnerability in RealPlayer 10.5 (6.0.12.1040) and earlier allows remote attackers to delete arbitrary files via a Real Metadata Packages (RMP) file with a FILENAME tag containing .. (dot dot) sequences in a filename that ends with a ? (question mark) and an allowed file extension (e.g. .mp3), which bypasses the check for the file extension.

Vulnerable Systems

Application

  • Realnetworks Realone Player 1.0

  • Realnetworks Realone Player 2.0

  • Realnetworks Realplayer 10.0

  • Realnetworks Realplayer 10.0 6.0.12.690

  • Realnetworks Realplayer 10.0 Beta

  • Realnetworks Realplayer 10.5

  • Realnetworks Realplayer 10.5 6.0.12.1016 Beta

  • Realnetworks Realplayer 10.5 6.0.12.1040


References

XF - realplayer-media-file-deletion(17551)

BID - 11308

MISC - http://www.ngssoftware.com/advisories/real-02full.txt

CONFIRM - http://service.real.com/help/faq/security/040928_player/EN/

SECUNIA - 12672

BUGTRAQ - 20050119 RealPlayer Arbitrary File Deletion Vulnerability (#NISR19012005f)

BUGTRAQ - 20041006 Patch available for multiple high risk vulnerabilities in RealPlayer


Last Updated: 27 May 2016 10:39:42