TITLE: RealPlayer RealMedia ".rm" Security Bypass Vulnerability SECUNIA ADVISORY ID: SA14087 VERIFY ADVISORY: http://secunia.com/advisories/14087/ CRITICAL: Less critical IMPACT: Security Bypass WHERE: >From remote SOFTWARE: RealPlayer 10.x http://secunia.com/product/2968/ DESCRIPTION: http-equiv has discovered a vulnerability in RealPlayer, which can be exploited by malicious people to bypass certain security restrictions. The problem is that RealMedia ".rm" files can open local files in the built-in browser. This can be exploited by e.g. a malicious website to load a local HTML document in a local context via a specially crafted RealMedia file. Exploit code has been published which combines this vulnerability with a publicly known vulnerability in Microsoft Internet Explorer to compromise a user's system, see: SA12889 The vulnerability has been confirmed on version 10.5 (build 6.0.12.1056). Other versions may also be affected. SOLUTION: Don't open untrusted ".rm" files and restrict ".rm" files from being opened automatically from within browsers. PROVIDED AND/OR DISCOVERED BY: http-equiv OTHER REFERENCES: SA12889: http://secunia.com/advisories/12889/ ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. ---------------------------------------------------------------------- Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org ----------------------------------------------------------------------