Check Point Reference: | CPAI-2004-113 |
Date Published: | 2 Nov 2009 |
Severity: | High |
Last Updated: | Monday 02 November, 2009 |
Source: | |
Industry Reference: | CVE-2003-0726 |
Protection Provided by: |
Security Gateway |
Who is Vulnerable? | |
Vulnerability Description | SMIL files (file extension ".smil" or ".smi") contain XML tags that identify the various multimedia objects to be played. RealPlayer fails to validate the SMIL file's content, and permits objects of type of "javascript", which are then executed in the client. An XSS (Cross Site Scripting) Vulnerability exists in the RealPlayer's handling of SMIL (Synchronized Multimedia Integration Language) metafiles. This allows a malicious entity to attack vulnerable RealPlayer clients. A similar vulnerability was discovered in August 2003; the current issue is a variant of its predecessor. The attacked target will execute the malicious Javascript bundled with the SMIL file. This may allow the attacker to access sensitive data on the victim's local system, such as cookie information for a particular website. It could also download to the victim other resources specified by the attacker. The saved files could be used by other exploits, which could in turn be used to mount further attacks. |
This protection will detect and block attempts to download SMIL files that contain embedded javascript content.
In order for the protection to be activated, update your Security Gateway product to the latest IPS update. For information on how to update IPS, go to SBP-2006-05, click on Protection tab and select the version of your choice.
This protection's log will contain the following information:
Attack Name: Media Player Enforcement Violation.
Attack Information: RealNetworks RealPlayer SMIL cross-site scripting