Vulnerability Details : CVE-2011-1426
The OpenURLInDefaultBrowser method in RealNetworks RealPlayer 11.0 through 11.1 and 14.0.0 through 14.0.2, and RealPlayer SP 1.0 through 1.1.5, launches a default handler for the filename specified in the first argument, which allows remote attackers to execute arbitrary code via a .rnx filename corresponding to a crafted RNX file.
Vulnerability category: Execute code
Products affected by CVE-2011-1426
- cpe:2.3:a:realnetworks:realplayer:11.0:*:*:*:*:*:*:*
- cpe:2.3:a:realnetworks:realplayer:11.1:*:*:*:*:*:*:*
- cpe:2.3:a:realnetworks:realplayer:14.0.0:*:*:*:*:*:*:*
- cpe:2.3:a:realnetworks:realplayer:14.0.1:*:*:*:*:*:*:*
- cpe:2.3:a:realnetworks:realplayer:14.0.2:*:*:*:*:*:*:*
- cpe:2.3:a:realnetworks:realplayer_sp:1.0.0:*:*:*:*:*:*:*
- cpe:2.3:a:realnetworks:realplayer_sp:1.0.1:*:*:*:*:*:*:*
- cpe:2.3:a:realnetworks:realplayer_sp:1.1.3:*:*:*:*:*:*:*
- cpe:2.3:a:realnetworks:realplayer_sp:1.1.2:*:*:*:*:*:*:*
- cpe:2.3:a:realnetworks:realplayer_sp:1.0.5:*:*:*:*:*:*:*
- cpe:2.3:a:realnetworks:realplayer_sp:1.1:*:*:*:*:*:*:*
- cpe:2.3:a:realnetworks:realplayer_sp:1.1.4:*:*:*:*:*:*:*
- cpe:2.3:a:realnetworks:realplayer_sp:1.0.2:*:*:*:*:*:*:*
- cpe:2.3:a:realnetworks:realplayer_sp:1.1.1:*:*:*:*:*:*:*
- cpe:2.3:a:realnetworks:realplayer_sp:1.1.5:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2011-1426
37.72%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 97 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2011-1426
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
9.3
|
HIGH | AV:N/AC:M/Au:N/C:C/I:C/A:C |
8.6
|
10.0
|
NIST |
References for CVE-2011-1426
-
http://zerodayinitiative.com/advisories/ZDI-11-122/
ZDI-11-122 | Zero Day Initiative
-
https://exchange.xforce.ibmcloud.com/vulnerabilities/66728
Real Networks RealPlayer OpenURLInDefaultBrowser() code execution CVE-2011-1426 Vulnerability Report
-
http://securitytracker.com/id?1025351
RealPlayer OpenURLInDefaultBrowser() Function Lets Remote Users Execute Arbitrary Code - SecurityTracker
-
http://www.securityfocus.com/bid/47335
Real Networks RealPlayer 'OpenURLInDefaultBrowser()' Function Remote Code Execution Vulnerability
-
http://www.vupen.com/english/advisories/2011/0979
Webmail | OVH- OVHVendor Advisory
-
http://www.securityfocus.com/archive/1/517470/100/0/threaded
SecurityFocus
-
http://service.real.com/realplayer/security/04122011_player/en/
RealPlayer and RealTimes Official Homepage – Real.comVendor Advisory
Jump to