| VID |
28292 |
| Severity |
40 |
| Port |
139,445 |
| Protocol |
TCP |
| Class |
SMB |
| Detailed Description |
According to its build number, the installed version of RealPlayer on the remote Windows host is affected by a heap corruption vulnerability when processing AVI headers.
By tricking a user into opening a specially crafted AVI file, a remote attacker can leverage this issue to execute arbitrary code on the remote host subject to the privileges of the user running the affected application.
* Note: This check solely relied on the banner of the remote Web server to assess this vulnerability, so this might be a false positive.
* References: http://www.zerodayinitiative.com/advisories/ZDI-11-033/ http://archives.neohapsis.com/archives/fulldisclosure/2011-01/0521.html http://service.real.com/realplayer/security/01272011_player/en/
* Platforms Affected: RealPlayer for Windows Build 12.0.1.633 |
| Recommendation |
Upgrade to the latest version available from the RealNetworks Web site at http://kr.real.com/?error=/plus |
| Related URL |
CVE-2010-4393 (CVE) |
| Related URL |
46047 (SecurityFocus) |
| Related URL |
(ISS) |
|