First published: Wed Sep 29 2004(Updated: )
Directory traversal vulnerability in RealPlayer 10.5 (6.0.12.1040) and earlier allows remote attackers to delete arbitrary files via a Real Metadata Packages (RMP) file with a FILENAME tag containing .. (dot dot) sequences in a filename that ends with a ? (question mark) and an allowed file extension (e.g. .mp3), which bypasses the check for the file extension.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
RealNetworks RealPlayer | =1.0 | |
RealNetworks RealPlayer | =2.0 | |
RealPlayer | =10.0 | |
RealPlayer | =10.0 | |
RealPlayer | =10.0 | |
RealPlayer | =10.0_6.0.12.690 | |
RealPlayer | =10.0_beta | |
RealPlayer | =10.5 | |
RealPlayer | =10.5_6.0.12.1016_beta | |
RealPlayer | =10.5_6.0.12.1040 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2005-0190 is considered a critical vulnerability due to its potential for remote file deletion.
To fix CVE-2005-0190, update RealPlayer to the latest version that addresses this vulnerability.
CVE-2005-0190 affects RealPlayer versions 10.5 and earlier, including RealOne Player 1.0 and 2.0.
CVE-2005-0190 allows remote attackers to exploit directory traversal to delete arbitrary files.
A temporary workaround for CVE-2005-0190 is to restrict the use of RealPlayer or disable it until a patch is applied.