First published: Wed Sep 01 2004(Updated: )
Directory traversal vulnerability in RealOne Player, RealOne Player 2.0, and RealOne Enterprise Desktop allows remote attackers to upload arbitrary files via an RMP file that contains .. (dot dot) sequences in a .rjs skin file.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
RealNetworks RealOne Desktop Manager | ||
RealNetworks RealOne Enterprise Desktop | =6.0.11.774 | |
RealNetworks RealPlayer | =1.0 | |
RealNetworks RealPlayer | =2.0 | |
RealNetworks RealPlayer | =2.0 | |
RealNetworks RealPlayer | =6.0.11.818 | |
RealNetworks RealPlayer | =6.0.11.830 | |
RealNetworks RealPlayer | =6.0.11.841 | |
RealNetworks RealPlayer | =6.0.11.853 | |
RealNetworks RealPlayer | =6.0.11.868 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2004-0273 is considered to be of moderate severity due to its ability to allow remote file uploads.
To mitigate CVE-2004-0273, users should upgrade to the latest version of RealOne Player or RealOne Enterprise Desktop that addresses this vulnerability.
CVE-2004-0273 affects RealOne Player 1.0, 2.0, and various versions of RealOne Enterprise Desktop.
CVE-2004-0273 facilitates directory traversal attacks that allow attackers to upload arbitrary files.
As a workaround for CVE-2004-0273, users should avoid opening .rjs skin files from untrusted sources.