Directory traversal vulnerability in RealPlayer 10.5 (6.0.12.1040) and earlier allows remote attackers to delete arbitrary files via a Real Metadata Packages (RMP) file with a FILENAME tag containing .. (dot dot) sequences in a filename that ends with a ? (question mark) and an allowed file extension (e.g. .mp3), which bypasses the check for the file extension.
Software | From | Fixed in |
---|---|---|
realnetworks / realplayer | 10.0 | 10.0.x |
realnetworks / realplayer | 10.0_6.0.12.690 | 10.0_6.0.12.690.x |
realnetworks / realplayer | 10.0_beta | 10.0_beta.x |
realnetworks / realplayer | 10.5 | 10.5.x |
realnetworks / realplayer | 10.5_6.0.12.1016_beta | 10.5_6.0.12.1016_beta.x |
realnetworks / realplayer | 10.5_6.0.12.1040 | 10.5_6.0.12.1040.x |
realnetworks / realone_player | 1.0 | 1.0.x |
realnetworks / realone_player | 2.0 | 2.0.x |