|
|
| |
Credit:
The information has been provided by Martin Bartek.
The original article can be found at: http://www.zerodayinitiative.com/advisories/ZDI-11-269/
|
| |
Vulnerable Systems:
* RealNetworks RealPlayer
User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.
The specific flaw exists due to the fact that RealPlayer allows users to run local HTML files with scripting enabled without any warning. The RealPlayer ActiveX control can be scripted from a web browser to load local HTML files. This can lead to remote code execution under the context of the current user.
Patch Availability:
RealNetworks has issued an update to correct this vulnerability. More details can be found at:
http://service.real.com/realplayer/security/08162011_player/en/
CVE Information:
CVE-2011-2947
Disclosure Timeline:
2011-04-01 - Vulnerability reported to vendor
2011-08-16 - Coordinated public release of advisory
|
|
|