RealOne player allows remote attackers to execute arbitrary script in the "My Computer" zone via a SMIL presentation with a URL that references a scripting protocol, which is executed in the security context of the previously loaded URL, as demonstrated using a "javascript:" URL in the area tag.
Link | Tags |
---|---|
http://www.securityfocus.com/bid/8453 | exploit vdb entry patch vendor advisory |
http://www.digitalpranksters.com/advisories/realnetworks/smilscriptprotocol.html | url repurposed patch vendor advisory exploit |
https://exchange.xforce.ibmcloud.com/vulnerabilities/13028 | vdb entry |
http://www.securityfocus.com/archive/1/335293 | mailing list exploit vendor advisory |
http://www.service.real.com/help/faq/security/securityupdate_august2003.html | |
http://securitytracker.com/id?1007532 | vdb entry |