[NEWS] RealOne Player SMIL Cross-Site Scripting Vulnerability
From: SecuriTeam (support_at_securiteam.com)
To: firstname.lastname@example.org Date: 21 Oct 2003 18:53:24 +0200
The following security advisory is sent to the securiteam mailing list, and can be found at the SecuriTeam web site: http://www.securiteam.com
- - promotion
The SecuriTeam alerts list - Free, Accurate, Independent.
Get your security news from a reliable source.
- - - - - - - - -
RealOne Player SMIL Cross-Site Scripting Vulnerability
RealNetworks has reported a vulnerability in RealOne Player, which can be
exploited by malicious people to execute arbitrary code.
* RealOne Player (English only)
* RealOne Player v2 for Windows (all language versions)
* RealOne Enterprise Desktop (all versions, standalone and as configured
by the RealOne Desktop Manager)
The vulnerability is caused due to an error in the handling of SMIL files.
This can be exploited to execute script code in the context of an
arbitrary domain or the local system by constructing a specially crafted
SMIL file and tricking a user into executing it.
Updates for RealOne Player can be installed by using the "Check for
Update RealOne Desktop Manager:
Update RealOne Enterprise Desktop:
The information has been provided by KrazySnake, DigitalPranksters.
This bulletin is sent to members of the SecuriTeam mailing list.
To unsubscribe from the list, send mail with an empty subject line and body to: email@example.com
In order to subscribe to the mailing list, simply forward this email to: firstname.lastname@example.org
The information in this bulletin is provided "AS IS" without warranty of any kind.
In no event shall we be liable for any damages whatsoever including direct, indirect, incidental, consequential, loss of business profits or special damages.