First published: Wed Dec 31 2003(Updated: )
Real Networks RealOne Enterprise Desktop 6.0.11.774, RealOne Player 2.0, and RealOne Player 6.0.11.818 through RealOne Player 6.0.11.853 allows remote attackers to execute arbitrary script in the local security zone by embedding script in a temp file before the temp file is executed by the default web browser.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
RealNetworks RealPlayer | =6.0.11.841 | |
RealNetworks RealPlayer | =2.0 | |
RealNetworks RealOne Enterprise Desktop | =6.0.11.774 | |
RealNetworks RealPlayer | =6.0.11.830 | |
RealNetworks RealPlayer | =6.0.11.818 | |
RealNetworks RealPlayer | =6.0.11.853 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2003-1509 has a medium severity level as it allows remote attackers to execute arbitrary scripts in a user's local security zone.
To fix CVE-2003-1509, users should update to the latest version of RealOne Player or RealOne Enterprise Desktop as provided in the security update.
CVE-2003-1509 affects RealOne Enterprise Desktop 6.0.11.774 and multiple versions of RealOne Player including 2.0, 6.0.11.818, 6.0.11.830, 6.0.11.841, and 6.0.11.853.
CVE-2003-1509 enables remote code execution attacks by allowing attackers to embed scripts in temporary files executed by the default web browser.
If you are using any of the affected versions of RealOne Player or RealOne Enterprise Desktop, your system is vulnerable to CVE-2003-1509.