First published: Mon Feb 21 2011(Updated: )
RealNetworks RealPlayer 11.0 through 11.1, SP 1.0 through 1.1.5, and 14.0.0 through 14.0.1, and Enterprise 2.0 through 2.1.4, uses predictable names for temporary files, which allows remote attackers to conduct cross-domain scripting attacks and execute arbitrary code via the OpenURLinPlayerBrowser function.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
RealPlayer | =11.0 | |
RealPlayer | =11.1 | |
RealPlayer | =14.0.1 | |
RealPlayer | =14.0.0 | |
RealNetworks RealPlayer SP | =1.0.1 | |
RealNetworks RealPlayer SP | =1.1.5 | |
RealNetworks RealPlayer SP | =1.1.3 | |
RealNetworks RealPlayer SP | =1.0.0 | |
RealNetworks RealPlayer SP | =1.0.2 | |
RealNetworks RealPlayer SP | =1.1 | |
RealNetworks RealPlayer SP | =1.1.2 | |
RealNetworks RealPlayer SP | =1.1.4 | |
RealNetworks RealPlayer SP | =1.1.1 | |
RealNetworks RealPlayer SP | =1.0.5 | |
RealPlayer | =2.1 | |
RealPlayer | =2.1.3 | |
RealPlayer | =2.1.2 | |
RealPlayer | =2.0 | |
RealPlayer | =2.1.4 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2011-0694 is classified as a medium-severity vulnerability that allows for cross-domain scripting attacks.
To fix CVE-2011-0694, users should update RealNetworks RealPlayer to the latest version available from the vendor.
CVE-2011-0694 affects RealPlayer versions 11.0 through 11.1, SP 1.0 through 1.1.5, and 14.0.0 through 14.0.1.
CVE-2011-0694 allows attackers to execute arbitrary code via cross-domain scripting attacks.
Continuing to use affected software without mitigation is risky and not recommended due to potential exploitation.