Description
RealOne player 6.0.11.868 allows remote attackers to execute arbitrary script in the "My Computer" zone via a Synchronized Multimedia Integration Language (SMIL) presentation with a "file:javascript:" URL, which is executed in the security context of the previously loaded URL, a different vulnerability than CVE-2003-0726.
Product(s):
- RealNetworks Realone Enterprise Desktop 6.0.11.774
- RealNetworks Realone Player 1.0
- RealNetworks Realone Player 2.0
- RealNetworks Realone Player 6.0.10.505
- RealNetworks Realone Player 6.0.11.818
- RealNetworks Realone Player 6.0.11.830
- RealNetworks Realone Player 6.0.11.841
- RealNetworks Realone Player 6.0.11.853
- RealNetworks Realone Player 6.0.11.868
- Realnetworks RealPlayer 8.0
- Realnetworks RealPlayer 8.0 for Mac Os X
- Realnetworks RealPlayer 8.0 for Unix
Question to Ask Vendors:
- Can you confirm whether your systems are affected by CVE-2004-1798, and if so, what steps are you currently taking to mitigate this vulnerability?
- What is your estimated timeline for fully resolving CVE-2004-1798 in your products or services, and how will you communicate updates on this issue to us as your customer?
Recommended Actions:
- Check out the advisory links provided below.