RealJukebox 2 1.0.2.340 and 1.0.2.379, and RealOne Player Gold 6.0.10.505, allows remote attackers to execute arbitrary script in the Local computer zone by inserting the script into the skin.ini file of an RJS archive, then referencing skin.ini from a web page after it has been extracted, which is parsed as HTML by Internet Explorer or other Microsoft-based web readers.
References
Link | Resource |
---|---|
http://archives.neohapsis.com/archives/bugtraq/2002-07/0130.html | |
http://service.real.com/help/faq/security/bufferoverrun07092002.html | |
http://www.iss.net/security_center/static/9539.php | Patch Vendor Advisory |
http://www.kb.cert.org/vuls/id/888547 | US Government Resource |
http://www.securityfocus.com/bid/5210 | Patch Vendor Advisory |
Configurations
Configuration 1 (hide)
|
History
No history.
Information
Published : 2002-10-04 04:00
Updated : 2008-09-05 20:29
NVD link : CVE-2002-1015
Mitre link : CVE-2002-1015
CVE.ORG link : CVE-2002-1015
JSON object : View
Products Affected
realnetworks
- realone_player
- realjukebox_2
- realjukebox_2_plus
CWE