{"vuid":"VU#473902","idnumber":"473902","name":"Multiple Real media players fail to properly validate SMIL files","keywords":["RealNetworks","RealOne Player","Real Player","RealOne Enterprise Desktop","RealPlayer Enterprise","SMIL","cross-site scripting","css"],"overview":"Multiple Real media players fail to properly validate synchronized multimedia integration language (SMIL) files which may permit a remote attacker to gain sensitive information.","clean_desc":"RealNetworks Real media players are multimedia applications that allow users to view local and remote audio/video content. These players support multiple media types including synchronized multimedia integration language (SMIL) files. There is a vulnerability in the way Real players validate SMIL files. This flaw could be used to conduct a cross-site scripting attack by creating a specially crafted SMIL file containing malicious script (JavaScript, VBScript, etc.). According to RealNetworks, this vulnerability may affect other media file types supported by these multimedia players. According to RealNetworks Security Advisory, this vulnerability affects the following products: RealOne Player\nRealOne Player v2 for Windows only (all languages)\nRealPlayer 10 Beta (English only)\nRealOne Enterprise Desktop or RealPlayer Enterprise (all versions, standalone and as configured by the RealOne Desktop Manager or RealPlayer Enterprise Manager)","impact":"A remote attacker could access sensitive information related to the vulnerable web page (cookies, form values, URI data).","resolution":"Upgrade For instructions on upgrading, please refer to RealNetworks Security Advisory.","workarounds":"","sysaffected":"","thanks":"Thanks to RealNetworks and Secunia for information contained in their security advisories.","author":"This document was written by Damon Morda.","public":["http://www.service.real.com/help/faq/security/040123_player/EN/","http://www.ngssoftware.com/advisories/realone.txt","http://www.secunia.com/advisories/10796/"],"cveids":[""],"certadvisory":"","uscerttechnicalalert":null,"datecreated":"2004-02-05T17:30:26Z","publicdate":"2004-02-05T00:00:00Z","datefirstpublished":"2004-02-06T16:49:29Z","dateupdated":"2004-02-06T17:57:51Z","revision":26,"vrda_d1_directreport":"","vrda_d1_population":"","vrda_d1_impact":"","cam_widelyknown":"15","cam_exploitation":"0","cam_internetinfrastructure":"5","cam_population":"12","cam_impact":"8","cam_easeofexploitation":"4","cam_attackeraccessrequired":"15","cam_scorecurrent":"2.16","cam_scorecurrentwidelyknown":"2.7","cam_scorecurrentwidelyknownexploited":"4.86","ipprotocol":"","cvss_accessvector":"","cvss_accesscomplexity":"","cvss_authentication":null,"cvss_confidentialityimpact":"","cvss_integrityimpact":"","cvss_availabilityimpact":"","cvss_exploitablity":null,"cvss_remediationlevel":"","cvss_reportconfidence":"","cvss_collateraldamagepotential":"","cvss_targetdistribution":"","cvss_securityrequirementscr":"","cvss_securityrequirementsir":"","cvss_securityrequirementsar":"","cvss_basescore":"","cvss_basevector":"","cvss_temporalscore":"","cvss_environmentalscore":"","cvss_environmentalvector":"","metric":2.16,"vulnote":null}