# RealTimes (Realplayer) Desktop Service Trusted Path Privilege Escalation
# Affected Version: 18.0.1.6 or below
# Vendor Homepage: http://www.real.com/?ref=cloud
# Vulnerability discovered by Jay Turla (@shipcod3)
# Tested on Windows 7 Service Pack 1
# Reference: https://isc.sans.edu/diary/Help+eliminate+unquoted+path+vulnerabilities/14464
RealTimes (Realplayer) is vulnerable to Service Trusted Path Privilege Escalation because its path in the binary services are unquoted and contain spaces specifically the "RealTimes Desktop Service" for Windows.
C:\Users\jay>sc qc "RealTimes Desktop Service"
[SC] QueryServiceConfig SUCCESS
SERVICE_NAME: RealTimes Desktop Service
TYPE : 10 WIN32_OWN_PROCESS
START_TYPE : 2 AUTO_START
ERROR_CONTROL : 1 NORMAL
BINARY_PATH_NAME : c:\program files (x86)\real\realplayer\RPDS\Bin\rpdsvc.exe
LOAD_ORDER_GROUP :
TAG : 0
DISPLAY_NAME : RealTimes Desktop Service
DEPENDENCIES :
SERVICE_START_NAME : LocalSystem