# RealTimes (Realplayer) Desktop Service Trusted Path Privilege Escalation
# Affected Version: 18.0.1.6 or below
# Vendor Homepage: http://www.real.com/?ref=cloud
# Vulnerability discovered by Jay Turla (@shipcod3)
# Tested on Windows 7 Service Pack 1
# Reference: https://isc.sans.edu/diary/Help+eliminate+unquoted+path+vulnerabilities/14464
RealTimes (Realplayer) is vulnerable to Service Trusted Path Privilege Escalation because its path in the binary services are unquoted and contain spaces specifically the "RealTimes Desktop Service" for Windows.
C:\Users\jay>sc qc "RealTimes Desktop Service"
[SC] QueryServiceConfig SUCCESS
SERVICE_NAME: RealTimes Desktop Service
        TYPE               : 10  WIN32_OWN_PROCESS
        START_TYPE         : 2   AUTO_START
        ERROR_CONTROL      : 1   NORMAL
        BINARY_PATH_NAME   : c:\program files (x86)\real\realplayer\RPDS\Bin\rpdsvc.exe
        LOAD_ORDER_GROUP   :
        TAG                : 0
        DISPLAY_NAME       : RealTimes Desktop Service
        DEPENDENCIES       :
        SERVICE_START_NAME : LocalSystem