Vulnerability Name:

CVE-2005-0192 (CCN-18984)

Assigned:2004-10-06
Published:2004-10-06
Updated:2017-12-12
Summary:Directory traversal vulnerability in the parsing of Skin file names in RealPlayer 10.5 (6.0.12.1040) and earlier allows remote attackers to read arbitrary files via a .. (dot dot) in an RJS filename.
CVSS v3 Severity:3.7 Low (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N)
Exploitability Metrics:Attack Vector (AV): Network
Attack Complexity (AC): High
Privileges Required (PR): None
User Interaction (UI): None
Scope:Scope (S): Unchanged
Impact Metrics:Confidentiality (C): Low
Integrity (I): None
Availibility (A): None
CVSS v2 Severity:2.6 Low (CVSS v2 Vector: AV:N/AC:H/Au:N/C:P/I:N/A:N)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): High
Authentication (Au): None
Impact Metrics:Confidentiality (C): Partial
Integrity (I): None
Availibility (A): None
2.6 Low (CCN CVSS v2 Vector: AV:N/AC:H/Au:N/C:P/I:N/A:N)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): High
Athentication (Au): None
Impact Metrics:Confidentiality (C): Partial
Integrity (I): None
Availibility (A): None
Vulnerability Type:CWE-Other
Vulnerability Consequences:Obtain Information
References:Source: MITRE
Type: CNA
CVE-2005-0192

Source: BUGTRAQ
Type: Mailing List, Third Party Advisory
20041006 Patch available for multiple high risk vulnerabilities in RealPlayer

Source: BUGTRAQ
Type: Mailing List, Third Party Advisory
20050119 RealPlayer Miscellaneous Vulnerabilities (#NISR19012005g)

Source: CCN
Type: RealNetworks, Inc. Service and Support Web site
RealNetworks, Inc. Releases Update to Address Security Vulnerabilities.

Source: MISC
Type: Vendor Advisory
http://service.real.com/help/faq/security/040928_player/EN/

Source: CCN
Type: NGSSoftware Insight Security Research Advisory #NISR19012005g
RealPlayer Miscellaneous Vulnerabilities

Source: MISC
Type: Broken Link
http://www.ngssoftware.com/advisories/real-03full.txt

Source: CCN
Type: OSVDB ID: 13938
RealPlayer RJS Skin File Directory Traversal

Source: CCN
Type: BID-12315
RealNetworks RealOne Player And RealPlayer Multiple Potential Vulnerabilities

Source: XF
Type: Third Party Advisory, VDB Entry
realplayer-rjs-filenane-directory-traversal(18984)

Source: XF
Type: UNKNOWN
realplayer-rjs-filename-directory-traversal(18984)

Vulnerable Configuration:Configuration 1:
  • cpe:/a:realnetworks:realone_player:1.0:*:*:*:*:*:*:*
  • OR cpe:/a:realnetworks:realone_player:2.0:*:*:*:*:*:*:*
  • OR cpe:/a:realnetworks:realplayer:10.0:*:*:de:*:*:*:*
  • OR cpe:/a:realnetworks:realplayer:10.0:*:*:en:*:*:*:*
  • OR cpe:/a:realnetworks:realplayer:10.0:*:*:ja:*:*:*:*
  • OR cpe:/a:realnetworks:realplayer:10.0:beta:*:*:*:*:*:*
  • OR cpe:/a:realnetworks:realplayer:10.5:*:*:*:*:*:*:*

  • * Denotes that component is vulnerable
    BACK
    realnetworks realone player 1.0
    realnetworks realone player 2.0
    realnetworks realplayer 10.0
    realnetworks realplayer 10.0
    realnetworks realplayer 10.0
    realnetworks realplayer 10.0 beta
    realnetworks realplayer 10.5