Vulnerability Name:

CVE-2010-5228 (CCN-63790)

Assigned:2010-08-23
Published:2010-08-23
Updated:2012-09-07
Summary:Untrusted search path vulnerability in RealPlayer SP 1.1.5 12.0.0.879 allows local users to gain privileges via a Trojan horse rio500.dll file in the current working directory, as demonstrated by a directory that contains a .avi file.
Note: some of these details are obtained from third party information.
Per: http://cwe.mitre.org/data/definitions/426.html 'CWE-426 Untrusted Search Path'
CVSS v3 Severity:10.0 Critical (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H)
Exploitability Metrics:Attack Vector (AV): Network
Attack Complexity (AC): Low
Privileges Required (PR): None
User Interaction (UI): None
Scope:Scope (S): Changed
Impact Metrics:Confidentiality (C): High
Integrity (I): High
Availibility (A): High
CVSS v2 Severity:6.9 Medium (CVSS v2 Vector: AV:L/AC:M/Au:N/C:C/I:C/A:C)
5.9 Medium (Temporal CVSS v2 Vector: AV:L/AC:M/Au:N/C:C/I:C/A:C/E:POC/RL:W/RC:C)
Exploitability Metrics:Access Vector (AV): Local
Access Complexity (AC): Medium
Authentication (Au): None
Impact Metrics:Confidentiality (C): Complete
Integrity (I): Complete
Availibility (A): Complete
9.3 High (CCN CVSS v2 Vector: AV:N/AC:M/Au:N/C:C/I:C/A:C)
8.0 High (CCN Temporal CVSS v2 Vector: AV:N/AC:M/Au:N/C:C/I:C/A:C/E:POC/RL:W/RC:C)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Medium
Athentication (Au): None
Impact Metrics:Confidentiality (C): Complete
Integrity (I): Complete
Availibility (A): Complete
Vulnerability Type:CWE-Other
Vulnerability Consequences:Gain Access
References:Source: MITRE
Type: CNA
CVE-2010-5228

Source: CCN
Type: SA41092
RealPlayer Insecure Library Loading Vulnerability

Source: SECUNIA
Type: Vendor Advisory
41092

Source: MISC
Type: UNKNOWN
http://www.cs.ucdavis.edu/research/tech-reports/2010/CSE-2010-2.pdf

Source: CCN
Type: Microsoft Security Advisory (2269637)
Insecure Library Loading Could Allow Remote Code Execution

Source: CCN
Type: OSVDB ID: 67531
RealPlayer SP Path Subversion Arbitrary DLL Injection Code Execution

Source: CCN
Type: Real Networks Web site
RealPlayer

Source: CCN
Type: BID-42771
Real Networks RealPlayer SP 'rio500.dll' DLL Loading Arbitrary Code Execution Vulnerability

Source: XF
Type: UNKNOWN
realnetworksrealplayersp-dll-ce(63790)

Source: EXPLOIT-DB
Type: EXPLOIT
Offensive Security Exploit Database

Vulnerable Configuration:Configuration 1:
  • cpe:/a:realnetworks:realplayer_sp:1.1.5:*:*:*:*:*:*:*

  • * Denotes that component is vulnerable
    BACK
    realnetworks realplayer sp 1.1.5