RealOne player allows remote attackers to execute arbitrary script in the My Computer zone via a SMIL presentation with a URL that references a scripting protocol, which is executed in the security context of the previously loaded URL, as demonstrated using a javascript: URL in the area tag.
Name | Vendor | Start Version | End Version |
---|---|---|---|
Realone_desktop_manager | Realnetworks | * | * |
Realone_enterprise_desktop | Realnetworks | 6.0.11.774 (including) | 6.0.11.774 (including) |
Realone_player | Realnetworks | 2.0 (including) | 2.0 (including) |
Realone_player | Realnetworks | 6.0.10.505-gold (including) | 6.0.10.505-gold (including) |
Realone_player | Realnetworks | 6.0.11.818 (including) | 6.0.11.818 (including) |
Realone_player | Realnetworks | 6.0.11.830 (including) | 6.0.11.830 (including) |
Realone_player | Realnetworks | 6.0.11.841 (including) | 6.0.11.841 (including) |
Realone_player | Realnetworks | 6.0.11.853 (including) | 6.0.11.853 (including) |