Directory traversal vulnerability in RealPlayer 10.5 (6.0.12.1040) and earlier allows remote attackers to delete arbitrary files via a Real Metadata Packages (RMP) file with a FILENAME tag containing .. (dot dot) sequences in a filename that ends with a ? (question mark) and an allowed file extension (e.g. .mp3), which bypasses the check for the file extension.
2004-09-29T04:00:00.000
2025-04-03T01:03:51.193
Deferred
CVSSv2: 2.6 (LOW)
AV:N/AC:H/Au:N/C:N/I:P/A:N
4.9
2.9
Type | Vendor | Product | Version/Range | Vulnerable? |
---|---|---|---|---|
Application | realnetworks | realone_player | 1.0 | Yes |
Application | realnetworks | realone_player | 2.0 | Yes |
Application | realnetworks | realplayer | 10.0 | Yes |
Application | realnetworks | realplayer | 10.0 | Yes |
Application | realnetworks | realplayer | 10.0 | Yes |
Application | realnetworks | realplayer | 10.0_6.0.12.690 | Yes |
Application | realnetworks | realplayer | 10.0_beta | Yes |
Application | realnetworks | realplayer | 10.5 | Yes |
Application | realnetworks | realplayer | 10.5_6.0.12.1016_beta | Yes |
Application | realnetworks | realplayer | 10.5_6.0.12.1040 | Yes |