Directory traversal vulnerability in RealPlayer 10.5 (6.0.12.1040) and earlier allows remote attackers to delete arbitrary files via a Real Metadata Packages (RMP) file with a FILENAME tag containing .. (dot dot) sequences in a filename that ends with a ? (question mark) and an allowed file extension (e.g. .mp3), which bypasses the check for the file extension.
| Name | Vendor | Start Version | End Version |
|---|---|---|---|
| Realone_player | Realnetworks | 1.0 (including) | 1.0 (including) |
| Realone_player | Realnetworks | 2.0 (including) | 2.0 (including) |
| Realplayer | Realnetworks | 10.0 (including) | 10.0 (including) |
| Realplayer | Realnetworks | 10.0_6.0.12.690 (including) | 10.0_6.0.12.690 (including) |
| Realplayer | Realnetworks | 10.0_beta (including) | 10.0_beta (including) |
| Realplayer | Realnetworks | 10.5 (including) | 10.5 (including) |
| Realplayer | Realnetworks | 10.5_6.0.12.1016_beta (including) | 10.5_6.0.12.1016_beta (including) |
| Realplayer | Realnetworks | 10.5_6.0.12.1040 (including) | 10.5_6.0.12.1040 (including) |