Juniper Networks
Solutions
Products & Services
Company
Partners
Support
Education

Signature Detail

Security Intelligence Center
Signatures
Print

Short Name

APP:REAL:PLAYER-FILE-SEC-BYPASS

Severity

Medium

Recommended

No

Category

APP

Keywords

RealPlayer Local File Security Bypass

Release Date

2005/03/08

Update Number

1213

Supported Platforms

idp-4.0+, isg-3.0+, j-series-9.5+, mx-9.4+, srx-9.2+, srx-branch-9.4+, vsrx-12.1+

APP: RealPlayer Local File Security Bypass


This signature detects attempts to exploit a known vulnerability in the RealMedia RealPlayer program. An attacker can send a malicious .rm file to a user, which upon opening, could run other programs previously placed there by the attacker. The programs are run without user intervention. This attack requires the actual attack code to be placed on the target host's hard drive through some other means.

Extended Description

Successful exploitation of this vulnerability could allow an attacker to execute malicious code on a remote machine by bypassing system security features.

References

  • CVE: CVE-2005-2055
  • URL: http://service.real.com/help/faq/security/050623_player/EN/

Site Map
RSS Feeds
Careers
Accessibility
Feedback
Privacy Policy
Legal Notices
Copyright © 1999-2010 Juniper Networks, Inc. All rights reserved.
Help
|
My Account
|
Log Out