[Forgot Password]
Login  Register Subscribe

30480

 
 

423868

 
 

252212

 
 

909

 
 

196748

 
 

282

Paid content will be excluded from the download.


Download | Alert*
CVE
view JSON

CVE-2005-0190Date: (C)2004-09-29   (M)2023-12-22


Directory traversal vulnerability in RealPlayer 10.5 (6.0.12.1040) and earlier allows remote attackers to delete arbitrary files via a Real Metadata Packages (RMP) file with a FILENAME tag containing .. (dot dot) sequences in a filename that ends with a ? (question mark) and an allowed file extension (e.g. .mp3), which bypasses the check for the file extension.

CVSS Score and Metrics +CVSS Score and Metrics -

CVSS V2 Severity:
CVSS Score : 2.6
Exploit Score: 4.9
Impact Score: 2.9
 
CVSS V2 Metrics:
Access Vector: NETWORK
Access Complexity: HIGH
Authentication: NONE
Confidentiality: NONE
Integrity: PARTIAL
Availability: NONE
  
Reference:
BID-11308
SECUNIA-12672
http://marc.info/?l=bugtraq&m=109707741022291&w=2
http://marc.info/?l=bugtraq&m=110616160228843&w=2
http://service.real.com/help/faq/security/040928_player/EN/
http://www.ngssoftware.com/advisories/real-02full.txt
realplayer-media-file-deletion(17551)

CPE    1
cpe:/a:realnetworks:realplayer:10.5

© SecPod Technologies