The RV10 codec in RealNetworks RealPlayer 11.x, 14.x, and 15.x before 15.02.71, and RealPlayer SP 1.0 through 1.1.5, does not properly handle height and width values, which allows remote attackers to execute arbitrary code via a crafted RV10 RealVideo video stream.
References
Link | Resource |
---|---|
http://secunia.com/advisories/47896 | |
http://service.real.com/realplayer/security/02062012_player/en/ | Vendor Advisory |
http://secunia.com/advisories/47896 | |
http://service.real.com/realplayer/security/02062012_player/en/ | Vendor Advisory |
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
Configuration 3 (hide)
|
Configuration 4 (hide)
|
History
21 Nov 2024, 01:35
Type | Values Removed | Values Added |
---|---|---|
References | () http://secunia.com/advisories/47896 - | |
References | () http://service.real.com/realplayer/security/02062012_player/en/ - Vendor Advisory |
Information
Published : 2012-02-08 15:55
Updated : 2024-11-21 01:35
NVD link : CVE-2012-0926
Mitre link : CVE-2012-0926
CVE.ORG link : CVE-2012-0926
JSON object : View
Products Affected
realnetworks
- realplayer_sp
- realplayer
CWE
CWE-94
Improper Control of Generation of Code ('Code Injection')