• RealPlayer RealMedia File Handling Buffer Overflow
    Disclosure Date: 2012-12-14
    First seen: 2020-04-26
    exploit/windows/fileformat/real_player_url_property_bof
    This module exploits a stack based buffer overflow on RealPlayer <=15.0.6.14. The vulnerability exists in the handling of real media files, due to the insecure usage of the GetPrivateProfileString function to retrieve the URL property from an InternetShortcut section. This module generates a malicious rm file which must be opened with RealPlayer via drag and drop or double click methods. It has been tested successfully on Windows XP SP3 with RealPlayer 15.0.5.109. Authors: - suto <suto@vnsecurity.net>
  • RealNetworks Realplayer QCP Parsing Heap Overflow
    Disclosure Date: 2011-08-16
    First seen: 2020-04-26
    exploit/windows/browser/realplayer_qcp
    This module exploits a heap overflow in Realplayer when handling a .QCP file. The specific flaw exists within qcpfformat.dll. A static 256 byte buffer is allocated on the heap and user-supplied data from the file is copied within a memory copy loop. This allows a remote attacker to execute arbitrary code running in the context of the web browser via a .QCP file with a specially crafted "fmt" chunk. At this moment this module exploits the flaw on Windows XP IE6, IE7. Authors: - Sean de Regge - juan vazquez <juan.vazquez@metasploit.com>
  • RealNetworks RealPlayer CDDA URI Initialization Vulnerability
    Disclosure Date: 2010-11-15
    First seen: 2020-04-26
    exploit/windows/browser/realplayer_cdda_uri
    This module exploits an initialization flaw within RealPlayer 11/11.1 and RealPlayer SP 1.0 - 1.1.4. An abnormally long CDDA URI causes an object initialization failure. However, this failure is improperly handled and uninitialized memory executed. Authors: - bannedit <bannedit@metasploit.com> - sinn3r <sinn3r@metasploit.com>
3 metasploit modules found
Please note: Metasploit modules are only matched by CVE numbers. Visit metasploit web site for more details
This web site uses cookies for managing your session, storing preferences, website analytics and additional purposes described in our privacy policy.
By using this web site you are agreeing to CVEdetails.com terms of use!