Directory traversal vulnerability in RealPlayer 10.5 (6.0.12.1040) and earlier allows remote attackers to delete arbitrary files via a Real Metadata Packages (RMP) file with a FILENAME tag containing .. (dot dot) sequences in a filename that ends with a ? (question mark) and an allowed file extension (e.g. .mp3), which bypasses the check for the file extension.
Link | Tags |
---|---|
http://www.securityfocus.com/bid/11308 | patch vdb entry vendor advisory third party advisory |
http://marc.info/?l=bugtraq&m=110616160228843&w=2 | third party advisory mailing list |
http://service.real.com/help/faq/security/040928_player/EN/ | patch vendor advisory |
https://exchange.xforce.ibmcloud.com/vulnerabilities/17551 | third party advisory vdb entry |
http://secunia.com/advisories/12672/ | patch vendor advisory third party advisory |
http://www.ngssoftware.com/advisories/real-02full.txt | patch vendor advisory |
http://marc.info/?l=bugtraq&m=109707741022291&w=2 | third party advisory mailing list |