Vulnerability Note VU#473902

Multiple Real media players fail to properly validate SMIL files

Original Release date: 06 Feb 2004 | Last revised: 06 Feb 2004


Multiple Real media players fail to properly validate synchronized multimedia integration language (SMIL) files which may permit a remote attacker to gain sensitive information.


RealNetworks Real media players are multimedia applications that allow users to view local and remote audio/video content. These players support multiple media types including synchronized multimedia integration language (SMIL) files. There is a vulnerability in the way Real players validate SMIL files. This flaw could be used to conduct a cross-site scripting attack by creating a specially crafted SMIL file containing malicious script (JavaScript, VBScript, etc.). According to RealNetworks, this vulnerability may affect other media file types supported by these multimedia players.

According to RealNetworks Security Advisory, this vulnerability affects the following products:

  • RealOne Player
  • RealOne Player v2 for Windows only (all languages)
  • RealPlayer 10 Beta (English only)
  • RealOne Enterprise Desktop or RealPlayer Enterprise (all versions, standalone and as configured by the RealOne Desktop Manager or RealPlayer Enterprise Manager)


A remote attacker could access sensitive information related to the vulnerable web page (cookies, form values, URI data).



For instructions on upgrading, please refer to RealNetworks Security Advisory.

Systems Affected (Learn More)

VendorStatusDate NotifiedDate Updated
RealNetworksAffected-06 Feb 2004
If you are a vendor and your product is affected, let us know.

CVSS Metrics (Learn More)

Group Score Vector
Base N/A N/A
Temporal N/A N/A
Environmental N/A N/A



Thanks to RealNetworks and Secunia for information contained in their security advisories.

This document was written by Damon Morda.

Other Information

  • CVE IDs: Unknown
  • Date Public: 05 Feb 2004
  • Date First Published: 06 Feb 2004
  • Date Last Updated: 06 Feb 2004
  • Severity Metric: 2.16
  • Document Revision: 26


If you have feedback, comments, or additional information about this vulnerability, please send us email.