First published: Wed Sep 03 2003(Updated: )
RealOne player allows remote attackers to execute arbitrary script in the "My Computer" zone via a SMIL presentation with a URL that references a scripting protocol, which is executed in the security context of the previously loaded URL, as demonstrated using a "javascript:" URL in the area tag.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
RealNetworks RealOne Desktop Manager | ||
RealNetworks RealPlayer | =6.0.11.841 | |
RealNetworks RealPlayer | =2.0 | |
RealNetworks RealOne Enterprise Desktop | =6.0.11.774 | |
RealNetworks RealPlayer | =6.0.11.830 | |
RealNetworks RealPlayer | =6.0.10.505-gold | |
RealNetworks RealPlayer | =6.0.11.818 | |
RealNetworks RealPlayer | =6.0.11.853 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2003-0726 is considered a critical vulnerability due to its ability to allow remote code execution through scripting in untrusted zones.
To fix CVE-2003-0726, it is recommended to update to the latest version of the RealOne player or disable scripting protocols in the application settings.
CVE-2003-0726 affects several versions of RealOne Player and RealOne Desktop Manager.
CVE-2003-0726 allows attackers to execute arbitrary scripts in the "My Computer" zone, potentially compromising user systems.
While CVE-2003-0726 is an older vulnerability, systems running affected software without updates may still be at risk.