Juniper Networks
Solutions
Products & Services
Company
Partners
Support
Education

Signature Detail

Security Intelligence Center
Signatures
Print

Short Name

HTTP:MISC:REAL-RMP-TRAV

Severity

Medium

Recommended

No

Category

HTTP

Keywords

RealPlayer .RMP File Directory Traversal

Release Date

2004/09/22

Update Number

1213

Supported Platforms

idp-4.0+, isg-3.0+, j-series-9.5+, mx-9.4+, srx-9.2+, srx-branch-9.4+, vsrx-12.1+

HTTP: RealPlayer .RMP File Directory Traversal


This signature detects a malicious .RMP (RealJukebox Metadata Package) file downloaded through HTTP. Attackers can include a directory traversal exploit within a maliciously crafted .RMP to download malicious files to a target and execute them. RealOne Player, RealOne Player v2, RealOne Enterprise Desktop, and RealPlayer Enterprise are all affected.

Extended Description

RealPlayer/RealOne Players have been reported prone to a directory traversal vulnerability. The issue occurs within the RMP file processing routines of affected versions of the player.

Affected Products

  • Real Networks RealOne Desktop Manager
  • Real Networks RealOne Enterprise Desktop 6.0.11 .774
  • Real Networks RealOne Player 1.0.0
  • Real Networks RealOne Player 2.0.0
  • Real Networks RealOne Player 6.0.11 .818
  • Real Networks RealOne Player 6.0.11 .830
  • Real Networks RealOne Player 6.0.11 .841
  • Real Networks RealOne Player 6.0.11 .853
  • Real Networks RealOne Player 6.0.11 .868
  • Real Networks RealOne Player version 2.0 for Windows

References

  • BugTraq: 9580
  • CVE: CVE-2004-0273
  • URL: http://www.securityfocus.com/archive/1/352780
  • URL: http://www.juniper.net/security/auto/vulnerabilities/vuln1135.html

Site Map
RSS Feeds
Careers
Accessibility
Feedback
Privacy Policy
Legal Notices
Copyright © 1999-2010 Juniper Networks, Inc. All rights reserved.
Help
|
My Account
|
Log Out