First published: Fri Sep 07 2012(Updated: )
Untrusted search path vulnerability in RealPlayer SP 1.1.5 12.0.0.879 allows local users to gain privileges via a Trojan horse rio500.dll file in the current working directory, as demonstrated by a directory that contains a .avi file. NOTE: some of these details are obtained from third party information.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
RealNetworks RealPlayer SP | =1.1.5 | |
RealPlayer | =1.1.5 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2010-5228 has a medium severity rating as it allows local users to gain privileges through a malicious DLL.
To fix CVE-2010-5228, ensure that you update RealPlayer SP to a newer, patched version.
Users of RealPlayer SP version 1.1.5 are affected by CVE-2010-5228.
CVE-2010-5228 is classified as an untrusted search path vulnerability.
No, CVE-2010-5228 requires local access to exploit the vulnerability.