RealNetworks RealPlayer 'OpenURLInDefaultBrowser()' Code Execution Vulnerability (Windows)

Summary
This host is installed with RealPlayer which is prone to Code Execution Vulnerability.
Impact
Successful exploitation allows remote attackers to execute arbitrary code within the context of the affected application. Failed attacks may cause denial-of-service conditions.
Solution
Upgrade to RealPlayer version 14.0.3 or later, For updates refer to http://www.real.com/player
Insight
The flaw is caused by an error within the 'OpenURLInDefaultBrowser()' method when processing user-supplied parameters, which could allow an attacker to execute arbitrary code via a specially crafted '.rnx' file.
Affected
RealPlayer versions 11.0 through 11.1 RealPlayer SP versions 1.0 through 1.1.5 (12.x) RealPlayer versions 14.0.0 through 14.0.2
References