Vulnerability Name:

CVE-2005-2054 (CCN-21110)

Assigned:2005-06-23
Published:2005-06-23
Updated:2008-09-05
Summary:Unknown vulnerability in RealPlayer 10 and 10.5 (6.0.12.1040-1069) and RealOne Player v1 and v2 allows remote attackers to overwrite arbitrary files or execute arbitrary ActiveX controls via a crafted MP3 file.
CVSS v3 Severity:5.6 Medium (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L)
Exploitability Metrics:Attack Vector (AV): Network
Attack Complexity (AC): High
Privileges Required (PR): None
User Interaction (UI): None
Scope:Scope (S): Unchanged
Impact Metrics:Confidentiality (C): Low
Integrity (I): Low
Availibility (A): Low
CVSS v2 Severity:5.1 Medium (CVSS v2 Vector: AV:N/AC:H/Au:N/C:P/I:P/A:P)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): High
Authentication (Au): None
Impact Metrics:Confidentiality (C): Partial
Integrity (I): Partial
Availibility (A): Partial
5.1 Medium (CCN CVSS v2 Vector: AV:N/AC:H/Au:N/C:P/I:P/A:P)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): High
Athentication (Au): None
Impact Metrics:Confidentiality (C): Partial
Integrity (I): Partial
Availibility (A): Partial
Vulnerability Type:CWE-Other
Vulnerability Consequences:File Manipulation
References:Source: CCN
Type: VulnWatch Mailing List, Mon Jun 27 2005 - 15:50:50 CDT
High Risk Vulnerability in RealPlayer for Windows

Source: MITRE
Type: CNA
CVE-2005-2054

Source: CCN
Type: RealPlayer Customer Support Web page
RealNetworks, Inc. Releases Update to Address Security Vulnerabilities

Source: CONFIRM
Type: Patch, Vendor Advisory
http://service.real.com/help/faq/security/050623_player/EN/

Source: CCN
Type: OSVDB ID: 17578
RealPlayer/RealOne MP3 Processing Arbitrary File Overwrite

Source: CCN
Type: OSVDB ID: 17579
RealPlayer/RealOne MP3 Processing Arbitrary ActiveX Control Execution

Source: CCN
Type: RealPlayer Enterprise Web page
RealPlayer Enterprise

Source: CCN
Type: BID-14073
RealNetworks Real and RealOne Player Unspecified MP3 ActiveX Control Execution Vulnerability

Source: CCN
Type: RealPlayer Security Path Update dated June 23, 2005
Security Patch Update For Realplayer Enterprise

Source: XF
Type: UNKNOWN
realplayer-mp3-file-overwrite(21110)

Vulnerable Configuration:Configuration 1:
  • cpe:/a:realnetworks:realone_player:1.0:*:*:*:*:*:*:*
  • OR cpe:/a:realnetworks:realone_player:2.0:*:*:*:*:*:*:*
  • OR cpe:/a:realnetworks:realplayer:10.0:*:*:*:*:*:*:*
  • OR cpe:/a:realnetworks:realplayer:10.5_6.0.12.1040_1069:*:*:*:*:*:*:*

  • * Denotes that component is vulnerable
    BACK
    realnetworks realone player 1.0
    realnetworks realone player 2.0
    realnetworks realplayer 10.0
    realnetworks realplayer 10.5_6.0.12.1040_1069