CVE-2004-1798

RealOne player 6.0.11.868 allows remote attackers to execute arbitrary script in the "My Computer" zone via a Synchronized Multimedia Integration Language (SMIL) presentation with a "file:javascript:" URL, which is executed in the security context of the previously loaded URL, a different vulnerability than CVE-2003-0726.
References
Link Resource
http://secunia.com/advisories/9584 Patch Vendor Advisory
http://securitytracker.com/id?1008647 Exploit Third Party Advisory VDB Entry
http://www.osvdb.org/3826 Broken Link Patch
http://www.securityfocus.com/archive/1/349086 Exploit Third Party Advisory VDB Entry
http://www.securityfocus.com/bid/9378 Exploit Patch Third Party Advisory VDB Entry
https://exchange.xforce.ibmcloud.com/vulnerabilities/14168 Third Party Advisory VDB Entry
http://secunia.com/advisories/9584 Patch Vendor Advisory
http://securitytracker.com/id?1008647 Exploit Third Party Advisory VDB Entry
http://www.osvdb.org/3826 Broken Link Patch
http://www.securityfocus.com/archive/1/349086 Exploit Third Party Advisory VDB Entry
http://www.securityfocus.com/bid/9378 Exploit Patch Third Party Advisory VDB Entry
https://exchange.xforce.ibmcloud.com/vulnerabilities/14168 Third Party Advisory VDB Entry
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:realnetworks:realone_enterprise_desktop:6.0.11.774:*:*:*:*:*:*:*
cpe:2.3:a:realnetworks:realone_player:1.0:*:*:*:*:*:*:*
cpe:2.3:a:realnetworks:realone_player:2.0:*:*:*:*:*:*:*
cpe:2.3:a:realnetworks:realone_player:6.0.10.505:*:*:*:*:*:*:*
cpe:2.3:a:realnetworks:realone_player:6.0.11.818:*:*:*:*:*:*:*
cpe:2.3:a:realnetworks:realone_player:6.0.11.830:*:*:*:*:*:*:*
cpe:2.3:a:realnetworks:realone_player:6.0.11.841:*:*:*:*:*:*:*
cpe:2.3:a:realnetworks:realone_player:6.0.11.853:*:*:*:*:*:*:*
cpe:2.3:a:realnetworks:realone_player:6.0.11.868:*:*:*:*:*:*:*
cpe:2.3:a:realnetworks:realplayer:8.0:*:*:*:*:*:*:*

History

20 Nov 2024, 23:51

Type Values Removed Values Added
References () http://secunia.com/advisories/9584 - Patch, Vendor Advisory () http://secunia.com/advisories/9584 - Patch, Vendor Advisory
References () http://securitytracker.com/id?1008647 - Exploit, Third Party Advisory, VDB Entry () http://securitytracker.com/id?1008647 - Exploit, Third Party Advisory, VDB Entry
References () http://www.osvdb.org/3826 - Broken Link, Patch () http://www.osvdb.org/3826 - Broken Link, Patch
References () http://www.securityfocus.com/archive/1/349086 - Exploit, Third Party Advisory, VDB Entry () http://www.securityfocus.com/archive/1/349086 - Exploit, Third Party Advisory, VDB Entry
References () http://www.securityfocus.com/bid/9378 - Exploit, Patch, Third Party Advisory, VDB Entry () http://www.securityfocus.com/bid/9378 - Exploit, Patch, Third Party Advisory, VDB Entry
References () https://exchange.xforce.ibmcloud.com/vulnerabilities/14168 - Third Party Advisory, VDB Entry () https://exchange.xforce.ibmcloud.com/vulnerabilities/14168 - Third Party Advisory, VDB Entry

Information

Published : 2004-12-31 05:00

Updated : 2024-11-20 23:51


NVD link : CVE-2004-1798

Mitre link : CVE-2004-1798

CVE.ORG link : CVE-2004-1798


JSON object : View

Products Affected

realnetworks

  • realone_enterprise_desktop
  • realone_player
  • realplayer