The (1) Upsell.htm, (2) Main.html, and (3) Custsupport.html components in RealNetworks RealPlayer 11.0 through 11.1, RealPlayer SP 1.0 through 1.1.5, and RealPlayer Enterprise 2.1.2 and 2.1.3 allow remote attackers to inject code into the RealOneActiveXObject process, and consequently bypass intended Local Machine Zone restrictions and load arbitrary ActiveX controls, via unspecified vectors.
References
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
Configuration 3 (hide)
|
History
21 Nov 2024, 01:20
Type | Values Removed | Values Added |
---|---|---|
References | () http://osvdb.org/69857 - | |
References | () http://osvdb.org/69858 - | |
References | () http://osvdb.org/69859 - | |
References | () http://service.real.com/realplayer/security/12102010_player/en/ - Vendor Advisory | |
References | () http://www.securitytracker.com/id?1024861 - | |
References | () http://www.zerodayinitiative.com/advisories/ZDI-10-276 - | |
References | () http://www.zerodayinitiative.com/advisories/ZDI-10-277 - | |
References | () http://www.zerodayinitiative.com/advisories/ZDI-10-278 - |
Information
Published : 2010-12-14 16:00
Updated : 2024-11-21 01:20
NVD link : CVE-2010-4388
Mitre link : CVE-2010-4388
CVE.ORG link : CVE-2010-4388
JSON object : View
Products Affected
realnetworks
- realplayer_sp
- realplayer
CWE
CWE-20
Improper Input Validation