• RealNetworks RealPlayer Version Attribute Buffer Overflow
    Disclosure Date: 2013-12-20
    First seen: 2020-04-26
    exploit/windows/fileformat/realplayer_ver_attribute_bof
    This module exploits a stack-based buffer overflow vulnerability in version 16.0.3.51 and 16.0.2.32 of RealNetworks RealPlayer, caused by improper bounds checking of the version and encoding attributes inside the XML declaration. By persuading the victim to open a specially-crafted .RMP file, a remote attacker could execute arbitrary code on the system or cause the application to crash. Authors: - Gabor Seljan
  • RealPlayer RealMedia File Handling Buffer Overflow
    Disclosure Date: 2012-12-14
    First seen: 2020-04-26
    exploit/windows/fileformat/real_player_url_property_bof
    This module exploits a stack based buffer overflow on RealPlayer <=15.0.6.14. The vulnerability exists in the handling of real media files, due to the insecure usage of the GetPrivateProfileString function to retrieve the URL property from an InternetShortcut section. This module generates a malicious rm file which must be opened with RealPlayer via drag and drop or double click methods. It has been tested successfully on Windows XP SP3 with RealPlayer 15.0.5.109. Authors: - suto <suto@vnsecurity.net>
  • RealNetworks Realplayer QCP Parsing Heap Overflow
    Disclosure Date: 2011-08-16
    First seen: 2020-04-26
    exploit/windows/browser/realplayer_qcp
    This module exploits a heap overflow in Realplayer when handling a .QCP file. The specific flaw exists within qcpfformat.dll. A static 256 byte buffer is allocated on the heap and user-supplied data from the file is copied within a memory copy loop. This allows a remote attacker to execute arbitrary code running in the context of the web browser via a .QCP file with a specially crafted "fmt" chunk. At this moment this module exploits the flaw on Windows XP IE6, IE7. Authors: - Sean de Regge - juan vazquez <juan.vazquez@metasploit.com>
  • RealNetworks RealPlayer CDDA URI Initialization Vulnerability
    Disclosure Date: 2010-11-15
    First seen: 2020-04-26
    exploit/windows/browser/realplayer_cdda_uri
    This module exploits an initialization flaw within RealPlayer 11/11.1 and RealPlayer SP 1.0 - 1.1.4. An abnormally long CDDA URI causes an object initialization failure. However, this failure is improperly handled and uninitialized memory executed. Authors: - bannedit <bannedit@metasploit.com> - sinn3r <sinn3r@metasploit.com>
  • RealPlayer rmoc3260.dll ActiveX Control Heap Corruption
    Disclosure Date: 2008-03-08
    First seen: 2020-04-26
    exploit/windows/browser/realplayer_console
    This module exploits a heap corruption vulnerability in the RealPlayer ActiveX control. By sending a specially crafted string to the 'Console' property in the rmoc3260.dll control, an attacker may be able to execute arbitrary code. Authors: - Elazar Broad <elazarb@earthlink.net>
  • RealPlayer ierpplug.dll ActiveX Control Playlist Name Buffer Overflow
    Disclosure Date: 2007-10-18
    First seen: 2020-04-26
    exploit/windows/browser/realplayer_import
    This module exploits a stack buffer overflow in RealOne Player V2 Gold Build 6.0.11.853 and RealPlayer 10.5 Build 6.0.12.1483. By sending an overly long string to the "Import()" method, an attacker may be able to execute arbitrary code. Authors: - MC <mc@metasploit.com>
6 metasploit modules found
Please note: Metasploit modules are only matched by CVE numbers. Visit metasploit web site for more details
This web site uses cookies for managing your session, storing preferences, website analytics and additional purposes described in our privacy policy.
By using this web site you are agreeing to CVEdetails.com terms of use!