Vulnerability Name: | CVE-2010-3749 (CCN-62611) | ||||||||
Assigned: | 2010-10-15 | ||||||||
Published: | 2010-10-15 | ||||||||
Updated: | 2011-01-26 | ||||||||
Summary: | The browser-plugin implementation in RealNetworks RealPlayer 11.0 through 11.1 and RealPlayer SP 1.0 through 1.1 allows remote attackers to arguments to the RecordClip method, which allows remote attackers to download an arbitrary program onto a client machine, and execute this program, via a " (double quote) in an argument to the RecordClip method, aka "parameter injection." | ||||||||
CVSS v3 Severity: | 7.3 High (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L)
| ||||||||
CVSS v2 Severity: | 9.3 High (CVSS v2 Vector: AV:N/AC:M/Au:N/C:C/I:C/A:C) 7.3 High (Temporal CVSS v2 Vector: AV:N/AC:M/Au:N/C:C/I:C/A:C/E:POC/RL:OF/RC:C)
5.3 Medium (CCN Temporal CVSS v2 Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P/E:POC/RL:OF/RC:C)
| ||||||||
Vulnerability Type: | CWE-94 | ||||||||
Vulnerability Consequences: | Gain Access | ||||||||
References: | Source: MITRE Type: CNA CVE-2010-3749 Source: CCN Type: Packetstorm Security Website RealNetworks RealPlayer Code Execution Source: CCN Type: SA41096 RealPlayer SP Multiple Vulnerabilities Source: CCN Type: SA41743 RealPlayer Enterprise Multiple Vulnerabilities Source: CCN Type: RealNetworks Web Site RealNetworks, Inc. Releases Update to Address Security Vulnerabilities Source: CONFIRM Type: Vendor Advisory http://service.real.com/realplayer/security/10152010_player/en/ Source: EXPLOIT-DB Type: UNKNOWN 15991 Source: CCN Type: OSVDB ID: 68675 RealPlayer Multiple Products Browser Plugin RecordClip Method Parameter Injection Arbitrary Program Execution Source: BID Type: UNKNOWN 44144 Source: CCN Type: BID-44144 RETIRED: Real Networks RealPlayer SP and RealPlayer Enterprise Multiple Security Vulnerabilities Source: BID Type: UNKNOWN 44443 Source: CCN Type: BID-44443 Real Networks RealPlayer SP 'RecordClip' Method Remote Code Execution Vulnerability Source: MISC Type: UNKNOWN http://www.zerodayinitiative.com/advisories/ZDI-10-211/ Source: XF Type: UNKNOWN realplayer-recordclip-code-execution(62611) Source: EXPLOIT-DB Type: EXPLOIT Offensive Security Exploit Database [01-14-2011] Source: CCN Type: ZDI-10-211 RealNetworks Realplayer RecordClip Parameter Injection Remote Code Execution Vulnerability | ||||||||
Vulnerable Configuration: | Configuration 1: Configuration 2: Denotes that component is vulnerable | ||||||||
BACK |