# RealTimes (Realplayer) Desktop Service Trusted Path Privilege Escalation # Affected Version: 18.0.1.6 or below # Vendor Homepage: http://www.real.com/?ref=cloud # Vulnerability discovered by Jay Turla (@shipcod3) # Tested on Windows 7 Service Pack 1 # Reference: https://isc.sans.edu/diary/Help+eliminate+unquoted+path+vulnerabilities/14464 RealTimes (Realplayer) is vulnerable to Service Trusted Path Privilege Escalation because its path in the binary services are unquoted and contain spaces specifically the "RealTimes Desktop Service" for Windows. C:\Users\jay>sc qc "RealTimes Desktop Service" [SC] QueryServiceConfig SUCCESS SERVICE_NAME: RealTimes Desktop Service TYPE : 10 WIN32_OWN_PROCESS START_TYPE : 2 AUTO_START ERROR_CONTROL : 1 NORMAL BINARY_PATH_NAME : c:\program files (x86)\real\realplayer\RPDS\Bin\rpdsvc.exe LOAD_ORDER_GROUP : TAG : 0 DISPLAY_NAME : RealTimes Desktop Service DEPENDENCIES : SERVICE_START_NAME : LocalSystem