Vulnerability Details : CVE-2012-1904
mp4fformat.dll in the QuickTime File Format plugin in RealNetworks RealPlayer 15 and earlier, and RealPlayer SP 1.1.4 Build 12.0.0.756 and earlier, allows remote attackers to cause a denial of service (memory corruption and application crash) via a crafted MP4 file.
Vulnerability category: OverflowMemory CorruptionDenial of service
Exploit prediction scoring system (EPSS) score for CVE-2012-1904
Probability of exploitation activity in the next 30 days: 1.07%
Percentile, the proportion of vulnerabilities that are scored at or less: ~ 82 % EPSS Score History EPSS FAQ
CVSS scores for CVE-2012-1904
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Source |
---|---|---|---|---|---|
4.3
|
MEDIUM | AV:N/AC:M/Au:N/C:N/I:N/A:P |
8.6
|
2.9
|
[email protected] |
CWE ids for CVE-2012-1904
-
The product performs operations on a memory buffer, but it can read from or write to a memory location that is outside of the intended boundary of the buffer.Assigned by: [email protected] (Primary)
References for CVE-2012-1904
Products affected by CVE-2012-1904
- cpe:2.3:a:realnetworks:realplayer:*:*:*:*:*:*:*:*
- cpe:2.3:a:realnetworks:realplayer:10.0:*:*:*:*:*:*:*
- cpe:2.3:a:realnetworks:realplayer:10.5:*:*:*:*:*:*:*
- cpe:2.3:a:realnetworks:realplayer:11.0:*:*:*:*:*:*:*
- cpe:2.3:a:realnetworks:realplayer:11_build_6.0.14.748:*:*:*:*:*:*:*
- cpe:2.3:a:realnetworks:realplayer:11.0.5:*:*:*:*:*:*:*
- cpe:2.3:a:realnetworks:realplayer:11.0.3:*:*:*:*:*:*:*
- cpe:2.3:a:realnetworks:realplayer:11.0.4:*:*:*:*:*:*:*
- cpe:2.3:a:realnetworks:realplayer:11.0.1:*:*:*:*:*:*:*
- cpe:2.3:a:realnetworks:realplayer:11.0.2:*:*:*:*:*:*:*
- cpe:2.3:a:realnetworks:realplayer:11.1:*:*:*:*:*:*:*
- cpe:2.3:a:realnetworks:realplayer:12.0.0.1444:*:*:*:*:*:*:*
- cpe:2.3:a:realnetworks:realplayer:11.0.2.1744:*:*:*:*:*:*:*
- cpe:2.3:a:realnetworks:realplayer:14.0.0:*:*:*:*:*:*:*
- cpe:2.3:a:realnetworks:realplayer:14.0.1:*:*:*:*:*:*:*
- cpe:2.3:a:realnetworks:realplayer:14.0.3:*:*:*:*:*:*:*
- cpe:2.3:a:realnetworks:realplayer:14.0.4:*:*:*:*:*:*:*
- cpe:2.3:a:realnetworks:realplayer:14.0.5:*:*:*:*:*:*:*
- cpe:2.3:a:realnetworks:realplayer:14.0.2:*:*:*:*:*:*:*
- cpe:2.3:a:realnetworks:realplayer:14.0.1.609:*:*:*:*:*:*:*
- cpe:2.3:a:realnetworks:realplayer:12.0.0.1548:*:*:*:*:*:*:*
- cpe:2.3:a:realnetworks:realplayer:8:*:*:*:*:*:*:*
- cpe:2.3:a:realnetworks:realplayer:11.0.2.2315:*:*:*:*:*:*:*
- cpe:2.3:a:realnetworks:realplayer:11.1.3:*:*:*:*:*:*:*
- cpe:2.3:a:realnetworks:realplayer:7:*:*:*:*:*:*:*
- cpe:2.3:a:realnetworks:realplayer:6:*:*:*:*:*:*:*
- cpe:2.3:a:realnetworks:realplayer:5:*:*:*:*:*:*:*
- cpe:2.3:a:realnetworks:realplayer:4:*:*:*:*:*:*:*
- cpe:2.3:a:realnetworks:realplayer_sp:*:*:*:*:*:*:*:*
- cpe:2.3:a:realnetworks:realplayer_sp:1.0.0:*:*:*:*:*:*:*
- cpe:2.3:a:realnetworks:realplayer_sp:1.0.1:*:*:*:*:*:*:*
- cpe:2.3:a:realnetworks:realplayer_sp:1.1.3:*:*:*:*:*:*:*
- cpe:2.3:a:realnetworks:realplayer_sp:1.1.2:*:*:*:*:*:*:*
- cpe:2.3:a:realnetworks:realplayer_sp:1.0.5:*:*:*:*:*:*:*
- cpe:2.3:a:realnetworks:realplayer_sp:1.1:*:*:*:*:*:*:*
- cpe:2.3:a:realnetworks:realplayer_sp:1.0.2:*:*:*:*:*:*:*
- cpe:2.3:a:realnetworks:realplayer_sp:1.1.1:*:*:*:*:*:*:*