CVE-2003-0726

RealOne player allows remote attackers to execute arbitrary script in the "My Computer" zone via a SMIL presentation with a URL that references a scripting protocol, which is executed in the security context of the previously loaded URL, as demonstrated using a "javascript:" URL in the area tag.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:realnetworks:realone_desktop_manager:*:*:*:*:*:*:*:*
cpe:2.3:a:realnetworks:realone_enterprise_desktop:6.0.11.774:*:*:*:*:*:*:*
cpe:2.3:a:realnetworks:realone_player:2.0:*:*:*:*:*:*:*
cpe:2.3:a:realnetworks:realone_player:6.0.10.505:gold:*:*:*:*:*:*
cpe:2.3:a:realnetworks:realone_player:6.0.11.818:*:*:*:*:*:*:*
cpe:2.3:a:realnetworks:realone_player:6.0.11.830:*:*:*:*:*:*:*
cpe:2.3:a:realnetworks:realone_player:6.0.11.841:*:*:*:*:*:*:*
cpe:2.3:a:realnetworks:realone_player:6.0.11.853:*:*:*:*:*:*:*

History

20 Nov 2024, 23:45

Type Values Removed Values Added
References () http://securitytracker.com/id?1007532 - () http://securitytracker.com/id?1007532 -
References () http://www.digitalpranksters.com/advisories/realnetworks/smilscriptprotocol.html - Exploit, Patch, Vendor Advisory, URL Repurposed () http://www.digitalpranksters.com/advisories/realnetworks/smilscriptprotocol.html - Exploit, Patch, Vendor Advisory, URL Repurposed
References () http://www.securityfocus.com/archive/1/335293 - Exploit, Vendor Advisory () http://www.securityfocus.com/archive/1/335293 - Exploit, Vendor Advisory
References () http://www.securityfocus.com/bid/8453 - Exploit, Patch, Vendor Advisory () http://www.securityfocus.com/bid/8453 - Exploit, Patch, Vendor Advisory
References () http://www.service.real.com/help/faq/security/securityupdate_august2003.html - () http://www.service.real.com/help/faq/security/securityupdate_august2003.html -
References () https://exchange.xforce.ibmcloud.com/vulnerabilities/13028 - () https://exchange.xforce.ibmcloud.com/vulnerabilities/13028 -

14 Feb 2024, 01:17

Type Values Removed Values Added
References (MISC) http://www.digitalpranksters.com/advisories/realnetworks/smilscriptprotocol.html - Exploit, Patch, Vendor Advisory (MISC) http://www.digitalpranksters.com/advisories/realnetworks/smilscriptprotocol.html - Exploit, Patch, Vendor Advisory, URL Repurposed

Information

Published : 2003-10-20 04:00

Updated : 2024-11-20 23:45


NVD link : CVE-2003-0726

Mitre link : CVE-2003-0726

CVE.ORG link : CVE-2003-0726


JSON object : View

Products Affected

realnetworks

  • realone_enterprise_desktop
  • realone_player
  • realone_desktop_manager