Vulnerability Name: | CVE-2010-4396 (CCN-64015) | ||||||||
Assigned: | 2010-12-10 | ||||||||
Published: | 2010-12-10 | ||||||||
Updated: | 2011-01-19 | ||||||||
Summary: | Cross-zone scripting vulnerability in the HandleAction method in a certain ActiveX control in RealNetworks RealPlayer 11.0 through 11.1, RealPlayer SP 1.0 through 1.1.5, and RealPlayer Enterprise 2.1.2 allows remote attackers to inject arbitrary web script or HTML in the Local Zone by specifying a local file in a NavigateToURL action, as demonstrated by a local skin file. | ||||||||
CVSS v3 Severity: | 7.3 High (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L)
| ||||||||
CVSS v2 Severity: | 4.3 Medium (CVSS v2 Vector: AV:N/AC:M/Au:N/C:N/I:P/A:N) 3.2 Low (Temporal CVSS v2 Vector: AV:N/AC:M/Au:N/C:N/I:P/A:N/E:U/RL:OF/RC:C)
5.0 Medium (CCN Temporal CVSS v2 Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P/E:U/RL:OF/RC:C)
| ||||||||
Vulnerability Type: | CWE-20 | ||||||||
Vulnerability Consequences: | Gain Access | ||||||||
References: | Source: MITRE Type: CNA CVE-2010-4396 Source: OSVDB Type: UNKNOWN 69855 Source: CCN Type: SA38550 RealPlayer Multiple Vulnerabilities Source: CCN Type: SA42333 RealPlayer Enterprise Multiple Vulnerabilities Source: CCN Type: SA42512 Mac RealPlayer Multiple Vulnerabilities Source: CCN Type: SECTRACK ID: 1024861 RealPlayer Buffer Overflows and Memory Corruption Errors Let Remote Users Execute Arbitrary Code Source: CCN Type: RealNetworks Web Site RealNetworks, Inc. Releases Update to Address Security Vulnerabilities Source: CONFIRM Type: Vendor Advisory http://service.real.com/realplayer/security/12102010_player/en/ Source: CCN Type: OSVDB ID: 69855 RealPlayer Multiple Products ActiveX HandleAction Method Local Zone Cross-zone Scripting Source: SECTRACK Type: UNKNOWN 1024861 Source: MISC Type: UNKNOWN http://www.zerodayinitiative.com/advisories/ZDI-10-275 Source: XF Type: UNKNOWN realplayer-handleaction-code-exec(64015) Source: CCN Type: ZDI-10-275 RealNetworks RealPlayer Cross-Zone Scripting Remote Code Execution Vulnerability | ||||||||
Vulnerable Configuration: | Configuration 1: Configuration 2: Configuration 3: ![]() | ||||||||
BACK |