CVE-2004-1798
CVSS5.1
发布时间 :2004-12-31 00:00:00
修订时间 :2008-09-05 16:42:23
NMCO    

[原文]RealOne player 6.0.11.868 allows remote attackers to execute arbitrary script in the "My Computer" zone via a Synchronized Multimedia Integration Language (SMIL) presentation with a "file:javascript:" URL, which is executed in the security context of the previously loaded URL, a different vulnerability than CVE-2003-0726.


[CNNVD]RealOne Player SMIL文件脚本执行变化漏洞(CNNVD-200412-909)

        RealOne player 6.0.11.868版本存在漏洞。远程攻击者可以借助带有"file:javascript:" URL的Synchronized Multimedia Integration Language (SMIL)描述在"My Computer"区域中执行任意脚本,该漏洞在之前载入的URL的安全上下文中被执行,该漏洞不同于CVE-2003-0726。

- CVSS (基础分值)

CVSS分值: 5.1 [中等(MEDIUM)]
机密性影响: PARTIAL [很可能造成信息泄露]
完整性影响: PARTIAL [可能会导致系统文件被修改]
可用性影响: PARTIAL [可能会导致性能下降或中断资源访问]
攻击复杂度: HIGH [漏洞利用存在特定的访问条件]
攻击向量: [--]
身份认证: NONE [漏洞利用无需身份认证]

- CPE (受影响的平台与产品)

cpe:/a:realnetworks:realplayer:8.0
cpe:/a:realnetworks:realone_player:1.0
cpe:/a:realnetworks:realone_player:2.0
cpe:/a:realnetworks:realone_player:6.0.11.841
cpe:/a:realnetworks:realone_player:6.0.11.830
cpe:/a:realnetworks:realone_player:6.0.10.505:gold%2C_windows
cpe:/a:realnetworks:realone_player:6.0.11.853
cpe:/a:realnetworks:realone_player:6.0.11.868
cpe:/a:realnetworks:realone_desktop_manager
cpe:/a:realnetworks:realone_player:6.0.11.818
cpe:/a:realnetworks:realone_enterprise_desktop:6.0.11.774

- OVAL (用于检测的技术细节)

未找到相关OVAL定义

- 官方数据库链接

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-1798
(官方数据源) MITRE
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2004-1798
(官方数据源) NVD
http://www.cnnvd.org.cn/vulnerability/show/cv_cnnvdid/CNNVD-200412-909
(官方数据源) CNNVD

- 其它链接及资源

http://www.securityfocus.com/bid/9378
(PATCH)  BID  9378
http://www.osvdb.org/3826
(PATCH)  OSVDB  3826
http://secunia.com/advisories/9584
(VENDOR_ADVISORY)  SECUNIA  9584
http://xforce.iss.net/xforce/xfdb/14168
(UNKNOWN)  XF  realoneplayer-smil-xss(14168)
http://www.securityfocus.com/archive/1/349086
(UNKNOWN)  BUGTRAQ  20040107 RealNetworks fails to address Cross-Site Scripting in RealOne Player
http://securitytracker.com/id?1008647
(UNKNOWN)  SECTRACK  1008647

- 漏洞信息

RealOne Player SMIL文件脚本执行变化漏洞
中危 输入验证
2004-12-31 00:00:00 2006-01-05 00:00:00
远程  
        RealOne player 6.0.11.868版本存在漏洞。远程攻击者可以借助带有"file:javascript:" URL的Synchronized Multimedia Integration Language (SMIL)描述在"My Computer"区域中执行任意脚本,该漏洞在之前载入的URL的安全上下文中被执行,该漏洞不同于CVE-2003-0726。

- 公告与补丁

        RealSecurity has released an advisory dealing with this issue. The following text, describing how to apply the patch to address the issue with the vulnerable software, has been taken verbatim from the advisory:
        Windows Players:
        RealOne Player, RealOne Player v2 (localized languages) and RealPlayer 10 Beta customers please use the following steps to update your Player:
        1. In the Tools menu select Check for Update.
         2. Select the box next to the "RealPlayer 10" (English) or "RealOne Player" (localized) component.
         3. Click the Install button to download and install the update.
        RealPlayer 8 (version 6.0.9.584):
        1. Go to the Help menu.
         2. Select "Check for Update".
         3. Select the box next to the "RealPlayer 10" (English) or "RealOne Player" (localized) component.
         4. Click the Install button to download and install the update.

- 漏洞信息

3826
RealOne/RealPlayer SMIL XSS
Remote / Network Access Authentication Management, Information Disclosure, Input Manipulation
Loss of Integrity
Exploit Public

- 漏洞描述

RealOne player contains a flaw that allows a remote cross site scripting attack. This flaw exists because the application does not validate JavaScript opened by a SMIL file or other file. This could allow a user to create a specially crafted URL result in theft of cookie-based authentication credentials, but more seriously, could also cause embedded script code to be executed in a user's browser within the trust relationship between the browser and the server, leading to a loss of integrity.

- 时间线

2004-02-04 2003-12-23
Unknow Unknow

- 解决方案

It is also possible to correct the flaw by implementing the following workaround(s): 1. English versions of and RealOne Player v2, RealOne Player can access the latest Gold player. 2. RealPlayer 10 Beta users and those with localized versions of RealOne Player and RealOne Player v2, use the following steps to update the Player: -In the Tools menu select Check for Update. -Select the box next to the "RealPlayer 10" (English) or ¡°RealOne Player¡± (localized) component. -Click the Install button to download and install the update.

- 相关参考

- 漏洞作者

Unknown or Incomplete
 

 

关于SCAP中文社区

SCAP中文社区是国内第一个以SCAP为主题的中文开放社区。了解更多信息,请查阅[关于本站]

版权声明

CVE/CWE/OVAL均为MITRE公司的注册商标,它们的官方数据源均保存在MITRE公司的相关网站