Korean
<< Back
VID 28107
Severity 40
Port 139,445
Protocol TCP
Class SMB
Detailed Description The RealOne/RealPlayer, according to its version number, has multiple vulnerabilities(2). RealOne / RealPlayer is one of the most widely used products for internet media delivery for Microsoft Windows platforms and most Linux and Unix-based operating systems. RealPlayer versions 8, 10, 10.5, and Enterprise 1.x, RealOne Player versions 1 and 2, and Helix Player 1.x could allow an attacker to execute arbitrary code and delete arbitrary files on the affected host. By creating a specially-crafted SMIL or WAV file, a remote attacker could execute arbitrary code on the victim's system in the context of the victim that visits a malicious website.

* Note: This check requires an account with Guest or upper privileges which can access the registry of the remote host to scan. Absence of these condition will result in the check not being performed and a False Negative for all vulnerable hosts.

* References:
http://service.real.com/help/faq/security/050224_player/EN/
http://secunia.com/advisories/14456/
http://www.ciac.org/ciac/bulletins/p-152.shtml

* Platforms Affected:
RealNetworks, Inc., Helix Player 1.x
RealNetworks, Inc., RealOne Player 1.0, 2.0
RealNetworks, Inc., RealOne Player for Mac Any version
RealNetworks, Inc., RealPlayer 10
RealNetworks, Inc., RealPlayer 10 B10.0.0.325
RealNetworks, Inc., RealPlayer 10.5 B 6.0.12.1056
RealNetworks, Inc., RealPlayer 8.0
RealNetworks, Inc., RealPlayer Enterprise 1.x
Microsoft Windows Any version
Linux Any version
Apple Mac OS Any version
Recommendation For RealOne and RealPlayer:
Apply the update for this vulnerability, available from the RealNetwork's Customer Support Release Update dated March 1, 2005 at http://service.real.com/help/faq/security/050224_player/EN/

For RealPlayer Enterprise:
Apply the patch for this vulnerability, available from the RealNetwork's Security Patch Update dated March 1, 2005 at http://service.real.com/help/faq/security/security022405.html

For Helix Player:
Apply the update for this vulnerability, available from the Helix Player Community Download Web page at https://player.helixcommunity.org/2004/downloads/

For other distributions:
Contact your vendor for upgrade or patch information.
Related URL CVE-2005-0455,CVE-2005-0611 (CVE)
Related URL 12697,12698 (SecurityFocus)
Related URL 19549 (ISS)