Inicial ▼ Bookkeeping
Online ▼ Auditorias ▼
DNS
Administrado ▼
Acerca de DNS
Ordenar/Renovar
Preguntas Frecuentes
AUP
Dynamic DNS Clients
Configurar Dominios Dynamic DNS Update Password Monitoreo
de Redes ▼
Enterprise
Avanzado
Estándarr
Prueba
Preguntas Frecuentes
Resumen de Precio/Funciones
Ordenar
Muestras
Configure/Status Alert Profiles | |||
ID de Prueba: | 1.3.6.1.4.1.25623.1.0.802802 |
Categoría: | General |
Título: | RealNetworks RealPlayer Atrac Sample Decoding Remote Code Execution Vulnerability (Mac OS X) |
Resumen: | This host is installed with RealPlayer which is prone to a remote; code execution vulnerability. |
Descripción: | Summary: This host is installed with RealPlayer which is prone to a remote code execution vulnerability. Vulnerability Insight: The flaw is due to an improper decoding of samples by ATRAC codec, which allows remote attackers to execute arbitrary code via a crafted ATRAC audio file. Vulnerability Impact: Successful exploitation allows remote attackers to execute arbitrary code. Affected Software/OS: RealPlayer versions 12.X through 12.0.0.1701 on Mac OS X Solution: Upgrade to RealPlayer version 12.0.0.1703 or later. CVSS Score: 9.3 CVSS Vector: AV:N/AC:M/Au:N/C:C/I:C/A:C |
Referencia Cruzada: |
BugTraq ID: 51890 Common Vulnerability Exposure (CVE) ID: CVE-2012-0928 |
Copyright | Copyright (C) 2012 Greenbone Networks GmbH |
Esta es sólo una de 99761 pruebas de vulnerabilidad en nuestra serie de pruebas. Encuentre más sobre cómo ejecutar una auditoría de seguridad completa. Para ejecutar una prueba gratuita de esta vulnerabilidad contra su sistema, regístrese ahora. |