GEN:SID 1:2437
Message WEB-CLIENT RealPlayer arbitrary javascript command attempt
Summary This event is generated when an attempt is made to exploit a known
vulnerability in RealOne Player.
Impact Serious. Execution of arbitrary code is possible.
Detailed Information It may be possible for an attacker to execute code of their choosing by
using a vulnerability in RealOne Player from RealNetworks. If a
malicious URI is embedded in a SMIL presentation that points to script
of the attackers choosing, the code may be executed with privileges
assigned to the "My Computer" zone.
Affected Systems RealOne Player for Windows    
Attack Scenarios An attacker could embed a URI of their choosing in a presentation and
entice a user to click the link from within RealOne Player. The code
referenced by this URI would then be executed on the client machine.
Ease of Attack Simple. No exploit software required.
Corrective Action Ensure the system is using an up to date version of the software and has
had all vendor supplied patches applied.
Additional References  
Rule References bugtraq: 8453
bugtraq: 9378
cve: 2003-0726