Description
Stack-based buffer overflow in RealNetworks RealPlayer 15.0.5.109 allows user-assisted remote attackers to execute arbitrary code via a crafted ZIP file that triggers incorrect processing of long pathnames by the Watch Folders feature.
References (6)
Core 6
Core References
Various Sources x_refsource_misc
http://www.reactionpenetrationtesting.co.uk/realplayer-watchfolders.html
Third Party Advisory, VDB Entry vdb-entry
x_refsource_bid
http://www.securityfocus.com/bid/56324
Mailing List mailing-list
x_refsource_fulldisc
http://seclists.org/fulldisclosure/2012/Oct/189
Exploit, Third Party Advisory x_refsource_misc
http://packetstormsecurity.org/files/117691/Realplayer-Watchfolders-Long-Filepath-Overflow.html
Third Party Advisory, VDB Entry vdb-entry
x_refsource_xf
https://exchange.xforce.ibmcloud.com/vulnerabilities/79663
Third Party Advisory, VDB Entry vdb-entry
x_refsource_osvdb
http://osvdb.org/86721
Scores
EPSS
0.0401
EPSS Percentile
88.6%
Details
CWE
CWE-119
Status
published
Products (1)
realnetworks/realplayer
15.0.5.109
Published
Nov 04, 2012
Tracked Since
Feb 18, 2026