Vulnerability Description
The browser-plugin implementation in RealNetworks RealPlayer 11.0 through 11.1 and RealPlayer SP 1.0 through 1.1 allows remote attackers to arguments to the RecordClip method, which allows remote attackers to download an arbitrary program onto a client machine, and execute this program, via a " (double quote) in an argument to the RecordClip method, aka "parameter injection."
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Realnetworks | Realplayer | 11.0 |
| Realnetworks | Realplayer Sp | 1.0.0 |
Related Weaknesses (CWE)
References
- http://service.real.com/realplayer/security/10152010_player/en/Vendor Advisory
- http://www.exploit-db.com/exploits/15991
- http://www.securityfocus.com/bid/44144
- http://www.securityfocus.com/bid/44443
- http://www.zerodayinitiative.com/advisories/ZDI-10-211/
- http://service.real.com/realplayer/security/10152010_player/en/Vendor Advisory
- http://www.exploit-db.com/exploits/15991
- http://www.securityfocus.com/bid/44144
- http://www.securityfocus.com/bid/44443
- http://www.zerodayinitiative.com/advisories/ZDI-10-211/
FAQ
What is CVE-2010-3749?
CVE-2010-3749 is a vulnerability with a CVSS score of 9.3 (HIGH). The browser-plugin implementation in RealNetworks RealPlayer 11.0 through 11.1 and RealPlayer SP 1.0 through 1.1 allows remote attackers to arguments to the RecordClip method, which allows remote atta...
How severe is CVE-2010-3749?
CVE-2010-3749 has been rated HIGH with a CVSS base score of 9.3/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2010-3749?
Check the references section above for vendor advisories and patch information. Affected products include: Realnetworks Realplayer, Realnetworks Realplayer Sp.