CVE-2005-0190
Published Sep 29, 2004
Last updated 7 years ago
Overview
- Description
- Directory traversal vulnerability in RealPlayer 10.5 (6.0.12.1040) and earlier allows remote attackers to delete arbitrary files via a Real Metadata Packages (RMP) file with a FILENAME tag containing .. (dot dot) sequences in a filename that ends with a ? (question mark) and an allowed file extension (e.g. .mp3), which bypasses the check for the file extension.
- Source
- cve@mitre.org
- NVD status
- Analyzed
Social media
- Hype score
- Not currently trending
Risk scores
CVSS 2.0
- Type
- Primary
- Base score
- 2.6
- Impact score
- 2.9
- Exploitability score
- 4.9
- Vector string
- AV:N/AC:H/Au:N/C:N/I:P/A:N
Weaknesses
- nvd@nist.gov
- NVD-CWE-Other
Configurations
[ { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:a:realnetworks:realone_player:1.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "7E940DAB-0CD5-4EC0-916F-6C0B2AE26D19" }, { "criteria": "cpe:2.3:a:realnetworks:realone_player:2.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "CF6535A6-6647-4E60-B5AA-24DFC06360AE" }, { "criteria": "cpe:2.3:a:realnetworks:realplayer:10.0:*:*:en:*:*:*:*", "vulnerable": true, "matchCriteriaId": "4EBB6E97-C8C0-49A7-BCDA-794C4986BAA3" }, { "criteria": "cpe:2.3:a:realnetworks:realplayer:10.0:*:*:ja:*:*:*:*", "vulnerable": true, "matchCriteriaId": "0C9031C2-95D1-46D0-965A-F4BAA76FB29F" }, { "criteria": "cpe:2.3:a:realnetworks:realplayer:10.0:*:de:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "E5E04CB6-AD7E-4F38-A6D9-D68C35DC9EBB" }, { "criteria": "cpe:2.3:a:realnetworks:realplayer:10.0_6.0.12.690:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "01513F87-049E-46A9-A573-A7AF27EB30C5" }, { "criteria": "cpe:2.3:a:realnetworks:realplayer:10.0_beta:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "9FDC43D9-C93E-4FB4-B05B-9FB519B03DCA" }, { "criteria": "cpe:2.3:a:realnetworks:realplayer:10.5:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "348F3214-E5C2-4D39-916F-1B0263D13F40" }, { "criteria": "cpe:2.3:a:realnetworks:realplayer:10.5_6.0.12.1016_beta:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "169753E3-949F-4B7D-9955-A52240CB8E6A" }, { "criteria": "cpe:2.3:a:realnetworks:realplayer:10.5_6.0.12.1040:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "91278EFD-0285-4389-9C53-50FE225C3C19" } ], "operator": "OR" } ] } ]