• RealNetworks RealPlayer Version Attribute Buffer Overflow
    Disclosure Date: 2013-12-20
    First seen: 2020-04-26
    exploit/windows/fileformat/realplayer_ver_attribute_bof
    This module exploits a stack-based buffer overflow vulnerability in version 16.0.3.51 and 16.0.2.32 of RealNetworks RealPlayer, caused by improper bounds checking of the version and encoding attributes inside the XML declaration. By persuading the victim to open a specially-crafted .RMP file, a remote attacker could execute arbitrary code on the system or cause the application to crash. Authors: - Gabor Seljan
  • RealPlayer RealMedia File Handling Buffer Overflow
    Disclosure Date: 2012-12-14
    First seen: 2020-04-26
    exploit/windows/fileformat/real_player_url_property_bof
    This module exploits a stack based buffer overflow on RealPlayer <=15.0.6.14. The vulnerability exists in the handling of real media files, due to the insecure usage of the GetPrivateProfileString function to retrieve the URL property from an InternetShortcut section. This module generates a malicious rm file which must be opened with RealPlayer via drag and drop or double click methods. It has been tested successfully on Windows XP SP3 with RealPlayer 15.0.5.109. Authors: - suto <suto@vnsecurity.net>
  • RealNetworks Realplayer QCP Parsing Heap Overflow
    Disclosure Date: 2011-08-16
    First seen: 2020-04-26
    exploit/windows/browser/realplayer_qcp
    This module exploits a heap overflow in Realplayer when handling a .QCP file. The specific flaw exists within qcpfformat.dll. A static 256 byte buffer is allocated on the heap and user-supplied data from the file is copied within a memory copy loop. This allows a remote attacker to execute arbitrary code running in the context of the web browser via a .QCP file with a specially crafted "fmt" chunk. At this moment this module exploits the flaw on Windows XP IE6, IE7. Authors: - Sean de Regge - juan vazquez <juan.vazquez@metasploit.com>
3 metasploit modules found
Please note: Metasploit modules are only matched by CVE numbers. Visit metasploit web site for more details
This web site uses cookies for managing your session, storing preferences, website analytics and additional purposes described in our privacy policy.
By using this web site you are agreeing to CVEdetails.com terms of use!