CVE-2005-0190

Properties

Published:
28.09.2004
Updated:
17.11.2017
Patch available:
Severity:
Low
  • CVSS vector:
    (AV:N/AC:H/Au:N/C:N/I:P/A:N)
    Product:
    realnetworks: realplayer
    realnetworks: realplayer
    realnetworks: realplayer
    realnetworks: realplayer
    realnetworks: realplayer
    realnetworks: realplayer
    realnetworks: realplayer
    realnetworks: realplayer

    Vulnerability description

    Directory traversal vulnerability in RealPlayer 10.5 (6.0.12.1040) and earlier allows remote attackers to delete arbitrary files via a Real Metadata Packages (RMP) file with a FILENAME tag containing .. (dot dot) sequences in a filename that ends with a ? (question mark) and an allowed file extension (e.g. .mp3), which bypasses the check for the file extension.

    References:

    BUGTRAQ: http://marc.info/?l=bugtraq&m=109707741022291&w=2
    BUGTRAQ: http://marc.info/?l=bugtraq&m=110616160228843&w=2
    CONFIRM: http://service.real.com/help/faq/security/040928_player/EN/
    MISC: http://www.ngssoftware.com/advisories/real-02full.txt
    BID: http://www.securityfocus.com/bid/11308
    XF: https://exchange.xforce.ibmcloud.com/vulnerabilities/17551