9.3

CVE-2012-0923

The RV20 codec in RealNetworks RealPlayer 11.x, 14.x, and 15.x before 15.02.71, and RealPlayer SP 1.0 through 1.1.5, does not properly handle the frame size array, which allows remote attackers to execute arbitrary code via a crafted RV20 RealVideo video stream.

Data is provided by the National Vulnerability Database (NVD)
RealnetworksRealplayer Version14.0.0
RealnetworksRealplayer Version14.0.1
RealnetworksRealplayer Version14.0.1.609
RealnetworksRealplayer Version14.0.1.633
RealnetworksRealplayer Version14.0.2
RealnetworksRealplayer Version14.0.3
RealnetworksRealplayer Version14.0.4
RealnetworksRealplayer Version14.0.5
RealnetworksRealplayer Version14.0.6
RealnetworksRealplayer Version14.0.7
RealnetworksRealplayer Version11.0
RealnetworksRealplayer Version11.0.1
RealnetworksRealplayer Version11.0.2
RealnetworksRealplayer Version11.0.2.1744
RealnetworksRealplayer Version11.0.2.2315
RealnetworksRealplayer Version11.0.3
RealnetworksRealplayer Version11.0.4
RealnetworksRealplayer Version11.0.5
RealnetworksRealplayer Version11.1
RealnetworksRealplayer Version11.1.3
RealnetworksRealplayer Version11_build_6.0.14.748
RealnetworksRealplayer Version15.0.0
RealnetworksRealplayer Version15.0.1.13
RealnetworksRealplayer Sp Version1.0.0
RealnetworksRealplayer Sp Version1.0.1
RealnetworksRealplayer Sp Version1.0.2
RealnetworksRealplayer Sp Version1.0.5
RealnetworksRealplayer Sp Version1.1
RealnetworksRealplayer Sp Version1.1.1
RealnetworksRealplayer Sp Version1.1.2
RealnetworksRealplayer Sp Version1.1.3
RealnetworksRealplayer Sp Version1.1.4
RealnetworksRealplayer Sp Version1.1.5
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Type Source Score Percentile
EPSS FIRST.org 3.58% 0.872
CVSS Metriken
Source Base Score Exploit Score Impact Score Vector string
nvd@nist.gov 9.3 8.6 10
AV:N/AC:M/Au:N/C:C/I:C/A:C
CWE-94 Improper Control of Generation of Code ('Code Injection')

The product constructs all or part of a code segment using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the syntax or behavior of the intended code segment.