CVE-2011-1221

Current Description

Cross-zone scripting vulnerability in the RealPlayer ActiveX control in RealNetworks RealPlayer 11.0 through 11.1 and 14.0.0 through 14.0.5, RealPlayer SP 1.0 through 1.1.5, and RealPlayer Enterprise 2.0 through 2.1.5 allows remote attackers to inject arbitrary web script or HTML in the Local Zone via a local HTML document, a different vulnerability than CVE-2011-2947.

Basic Data

PublishedOctober 04, 2011
Last ModifiedMay 14, 2012
Assignercve@mitre.org
Data TypeCVE
Data FormatMITRE
Data Version4.0
Problem TypeCWE-79
CVE Data Version4.0

Base Metric V2

CVSS 2 - Version2.0
CVSS 2 - Vector StringAV:N/AC:M/Au:N/C:N/I:P/A:N
CVSS 2 - Access VectorNETWORK
CVSS 2 - Access ComplexityMEDIUM
CVSS 2 - AuthenticationNONE
CVSS 2 - Confidentiality ImpactNONE
CVSS 2 - Availability ImpactNONE
CVSS 2 - Base Score4.3
SeverityMEDIUM
Exploitability Score8.6
Impact Score2.9
Obtain All Privilegefalse
Obtain User Privilegefalse
Obtain Other Privilegefalse

Base Metric V3

No data provided.

Configurations

  • OR - Configuration 1
    Cpe VersionPartVendorProductVersionUpdateEditionLanguageSW EditionTarget SWTarget HWOtherVersion Start IncludingVersion End IncludingVersion Start ExcludingVersion End Excluding
    2.3ApplicationRealnetworksRealplayer11.0*******
    2.3ApplicationRealnetworksRealplayer11.1*******
  • OR - Configuration 2
    Cpe VersionPartVendorProductVersionUpdateEditionLanguageSW EditionTarget SWTarget HWOtherVersion Start IncludingVersion End IncludingVersion Start ExcludingVersion End Excluding
    2.3ApplicationRealnetworksRealplayer14.0.0*******
    2.3ApplicationRealnetworksRealplayer14.0.1*******
    2.3ApplicationRealnetworksRealplayer14.0.2*******
    2.3ApplicationRealnetworksRealplayer14.0.3*******
    2.3ApplicationRealnetworksRealplayer14.0.4*******
    2.3ApplicationRealnetworksRealplayer14.0.5*******
  • OR - Configuration 3
    Cpe VersionPartVendorProductVersionUpdateEditionLanguageSW EditionTarget SWTarget HWOtherVersion Start IncludingVersion End IncludingVersion Start ExcludingVersion End Excluding
    2.3ApplicationRealnetworksRealplayer Sp1.0.0*******
    2.3ApplicationRealnetworksRealplayer Sp1.0.1*******
    2.3ApplicationRealnetworksRealplayer Sp1.0.2*******
    2.3ApplicationRealnetworksRealplayer Sp1.0.5*******
    2.3ApplicationRealnetworksRealplayer Sp1.1*******
    2.3ApplicationRealnetworksRealplayer Sp1.1.1*******
    2.3ApplicationRealnetworksRealplayer Sp1.1.2*******
    2.3ApplicationRealnetworksRealplayer Sp1.1.3*******
    2.3ApplicationRealnetworksRealplayer Sp1.1.4*******
    2.3ApplicationRealnetworksRealplayer Sp1.1.5*******
  • OR - Configuration 4
    Cpe VersionPartVendorProductVersionUpdateEditionLanguageSW EditionTarget SWTarget HWOtherVersion Start IncludingVersion End IncludingVersion Start ExcludingVersion End Excluding
    2.3ApplicationRealnetworksRealplayer2.0*enterprise*****
    2.3ApplicationRealnetworksRealplayer2.1*enterprise*****
    2.3ApplicationRealnetworksRealplayer2.1.2*enterprise*****
    2.3ApplicationRealnetworksRealplayer2.1.3*enterprise*****
    2.3ApplicationRealnetworksRealplayer2.1.4*enterprise*****
    2.3ApplicationRealnetworksRealplayer2.1.5*enterprise*****

Vulnerable Software List

VendorProductVersions
Realnetworks Realplayer Sp 1.0.0, 1.0.1, 1.0.2, 1.0.5, 1.1, 1.1.1, 1.1.2, 1.1.3, 1.1.4, 1.1.5
Realnetworks Realplayer 11.0, 11.1, 14.0.0, 14.0.1, 14.0.2, 14.0.3, 14.0.4, 14.0.5, 2.0, 2.1, 2.1.2, 2.1.3, 2.1.4, 2.1.5

References

NameSourceURLTags
http://service.real.com/realplayer/security/08162011_player/en/http://service.real.com/realplayer/security/08162011_player/en/CONFIRMVendor Advisory