First published: Tue Apr 17 2012(Updated: )
Buffer overflow in rn5auth.dll in RealNetworks Helix Server and Helix Mobile Server 14.x before 14.3.x allows remote attackers to execute arbitrary code via crafted authentication credentials.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
RealNetworks Helix Server | =14.0.0 | |
RealNetworks Helix Server | =14.0.1 | |
RealNetworks Helix Server | =14.2 | |
RealNetworks Helix Server | =14.2.0.212 | |
Realnetworks Helix Mobile Server | =14.0.0 | |
Realnetworks Helix Mobile Server | =14.0.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2012-0942 has a critical severity as it allows remote attackers to execute arbitrary code.
To fix CVE-2012-0942, upgrade RealNetworks Helix Server and Helix Mobile Server to version 14.3.x or later.
CVE-2012-0942 affects RealNetworks Helix Server versions 14.0.0, 14.0.1, and 14.2, as well as Helix Mobile Server versions 14.0.0 and 14.0.1.
Yes, CVE-2012-0942 can be exploited remotely through crafted authentication credentials.
CVE-2012-0942 can lead to arbitrary code execution, potentially compromising the affected server's security.