2024-12-08 03:06:42 +00:00

256 lines
8.5 KiB
JSON

{
"id": "CVE-2010-4388",
"sourceIdentifier": "cve@mitre.org",
"published": "2010-12-14T16:00:04.883",
"lastModified": "2024-11-21T01:20:50.590",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The (1) Upsell.htm, (2) Main.html, and (3) Custsupport.html components in RealNetworks RealPlayer 11.0 through 11.1, RealPlayer SP 1.0 through 1.1.5, and RealPlayer Enterprise 2.1.2 and 2.1.3 allow remote attackers to inject code into the RealOneActiveXObject process, and consequently bypass intended Local Machine Zone restrictions and load arbitrary ActiveX controls, via unspecified vectors."
},
{
"lang": "es",
"value": "Los componentes (1) Upsell.htm, (2) Main.html, y (3) Custsupport.html en RealNetworks RealPlayer v11.0 hasta v11.1, RealPlayer SP v1.0 hasta v1.1.5, RealPlayer Enterprise v2.1.2 y v2.1.3, permiten a atacantes remotos inyectar c\u00f3digo en el proceso RealOneActiveXObject y evitar las restricciones Local Machine Zone establecidas y cargar controles ActiveX de su elecci\u00f3n a trav\u00e9s de vectores no especificados."
}
],
"metrics": {
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"baseScore": 4.3,
"accessVector": "NETWORK",
"accessComplexity": "MEDIUM",
"authentication": "NONE",
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"availabilityImpact": "NONE"
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 8.6,
"impactScore": 2.9,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": true
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-20"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:realnetworks:realplayer:11.0:*:*:*:*:*:*:*",
"matchCriteriaId": "A8985B3B-BCC9-431D-9788-0C1949DF46E3"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:realnetworks:realplayer:11.0.1:*:*:*:*:*:*:*",
"matchCriteriaId": "9C7517C2-71A8-4223-9F9A-2FE5A2153B53"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:realnetworks:realplayer:11.0.2:*:*:*:*:*:*:*",
"matchCriteriaId": "11B7CB5F-ACFA-439B-A9B7-54DA402A6029"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:realnetworks:realplayer:11.0.3:*:*:*:*:*:*:*",
"matchCriteriaId": "B2A681B8-62F1-4B23-9E0B-39C61BE72F44"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:realnetworks:realplayer:11.0.4:*:*:*:*:*:*:*",
"matchCriteriaId": "F826B276-91E6-495E-B429-51B1C5ECB146"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:realnetworks:realplayer:11.0.5:*:*:*:*:*:*:*",
"matchCriteriaId": "0A732E6C-108F-447F-98B1-EA774A0537EB"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:realnetworks:realplayer:11.1:*:*:*:*:*:*:*",
"matchCriteriaId": "D03738C3-D659-488D-B285-64A496C0F1FB"
}
]
}
]
},
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:realnetworks:realplayer_sp:1.0.0:*:*:*:*:*:*:*",
"matchCriteriaId": "8BFD9C4F-E93B-4BCE-A5E2-A20945EB8534"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:realnetworks:realplayer_sp:1.0.1:*:*:*:*:*:*:*",
"matchCriteriaId": "5BBEBAA2-4892-4F9E-8C0E-94CA90DCD28D"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:realnetworks:realplayer_sp:1.0.2:*:*:*:*:*:*:*",
"matchCriteriaId": "53D7AE43-A3AC-4B38-B0A3-E6F02834224F"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:realnetworks:realplayer_sp:1.0.5:*:*:*:*:*:*:*",
"matchCriteriaId": "59FEDCDF-9FBF-4D08-A50F-FF92763DFC21"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:realnetworks:realplayer_sp:1.1:*:*:*:*:*:*:*",
"matchCriteriaId": "54A11B3A-547C-4F2F-A58E-DE06DBBE8115"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:realnetworks:realplayer_sp:1.1.1:*:*:*:*:*:*:*",
"matchCriteriaId": "C7243D80-913D-405C-9988-B8473DB1A5DC"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:realnetworks:realplayer_sp:1.1.2:*:*:*:*:*:*:*",
"matchCriteriaId": "D4C6D399-FF31-441D-A363-BD53CFE5569A"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:realnetworks:realplayer_sp:1.1.3:*:*:*:*:*:*:*",
"matchCriteriaId": "9818A6FB-2CF5-4236-8EFE-95458D603CC1"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:realnetworks:realplayer_sp:1.1.4:*:*:*:*:*:*:*",
"matchCriteriaId": "73CC0582-D889-4907-A32E-218AC2B0591F"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:realnetworks:realplayer_sp:1.1.5:*:*:*:*:*:*:*",
"matchCriteriaId": "2B5DD6CF-CCC7-40DD-A6CA-B9BBC339998F"
}
]
}
]
},
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:realnetworks:realplayer:2.1.2:*:enterprise:*:*:*:*:*",
"matchCriteriaId": "1E2BC096-43B6-4696-8467-CC3D0163EFF5"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:realnetworks:realplayer:2.1.3:*:enterprise:*:*:*:*:*",
"matchCriteriaId": "3A29D4B9-DD00-43F6-ACEA-B830FDFC1E5C"
}
]
}
]
}
],
"references": [
{
"url": "http://osvdb.org/69857",
"source": "cve@mitre.org"
},
{
"url": "http://osvdb.org/69858",
"source": "cve@mitre.org"
},
{
"url": "http://osvdb.org/69859",
"source": "cve@mitre.org"
},
{
"url": "http://service.real.com/realplayer/security/12102010_player/en/",
"source": "cve@mitre.org",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securitytracker.com/id?1024861",
"source": "cve@mitre.org"
},
{
"url": "http://www.zerodayinitiative.com/advisories/ZDI-10-276",
"source": "cve@mitre.org"
},
{
"url": "http://www.zerodayinitiative.com/advisories/ZDI-10-277",
"source": "cve@mitre.org"
},
{
"url": "http://www.zerodayinitiative.com/advisories/ZDI-10-278",
"source": "cve@mitre.org"
},
{
"url": "http://osvdb.org/69857",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "http://osvdb.org/69858",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "http://osvdb.org/69859",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "http://service.real.com/realplayer/security/12102010_player/en/",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securitytracker.com/id?1024861",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "http://www.zerodayinitiative.com/advisories/ZDI-10-276",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "http://www.zerodayinitiative.com/advisories/ZDI-10-277",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "http://www.zerodayinitiative.com/advisories/ZDI-10-278",
"source": "af854a3a-2127-422b-91ae-364da2661108"
}
]
}