• RealPlayer RealMedia File Handling Buffer Overflow
    Disclosure Date: 2012-12-14
    First seen: 2020-04-26
    This module exploits a stack based buffer overflow on RealPlayer <= The vulnerability exists in the handling of real media files, due to the insecure usage of the GetPrivateProfileString function to retrieve the URL property from an InternetShortcut section. This module generates a malicious rm file which must be opened with RealPlayer via drag and drop or double click methods. It has been tested successfully on Windows XP SP3 with RealPlayer Authors: - suto <suto@vnsecurity.net>
  • RealNetworks Realplayer QCP Parsing Heap Overflow
    Disclosure Date: 2011-08-16
    First seen: 2020-04-26
    This module exploits a heap overflow in Realplayer when handling a .QCP file. The specific flaw exists within qcpfformat.dll. A static 256 byte buffer is allocated on the heap and user-supplied data from the file is copied within a memory copy loop. This allows a remote attacker to execute arbitrary code running in the context of the web browser via a .QCP file with a specially crafted "fmt" chunk. At this moment this module exploits the flaw on Windows XP IE6, IE7. Authors: - Sean de Regge - juan vazquez <juan.vazquez@metasploit.com>
  • RealNetworks RealPlayer CDDA URI Initialization Vulnerability
    Disclosure Date: 2010-11-15
    First seen: 2020-04-26
    This module exploits an initialization flaw within RealPlayer 11/11.1 and RealPlayer SP 1.0 - 1.1.4. An abnormally long CDDA URI causes an object initialization failure. However, this failure is improperly handled and uninitialized memory executed. Authors: - bannedit <bannedit@metasploit.com> - sinn3r <sinn3r@metasploit.com>
3 metasploit modules found
Please note: Metasploit modules are only matched by CVE numbers. Visit metasploit web site for more details
This web site uses cookies for managing your session, storing preferences, website analytics and additional purposes described in our privacy policy.
By using this web site you are agreeing to CVEdetails.com terms of use!