First published: Tue Apr 17 2012(Updated: )
RealNetworks Helix Server and Helix Mobile Server 14.x before 14.3.x store passwords in cleartext under adm_b_db\users\, which allows local users to obtain sensitive information by reading a database.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
RealNetworks Helix Server | =14.0.0 | |
RealNetworks Helix Server | =14.0.1 | |
RealNetworks Helix Server | =14.2 | |
RealNetworks Helix Server | =14.2.0.212 | |
RealNetworks Helix Universal Mobile Server | =14.0.0 | |
RealNetworks Helix Universal Mobile Server | =14.0.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2012-1923 is considered a high severity vulnerability due to the exposure of passwords in cleartext.
To fix CVE-2012-1923, update the RealNetworks Helix Server or Helix Mobile Server to version 14.3 or later.
CVE-2012-1923 affects RealNetworks Helix Server versions 14.0.0 to 14.2.0.212 and Helix Mobile Server versions 14.0.0 to 14.0.1.
The risk associated with CVE-2012-1923 includes unauthorized access to sensitive user passwords stored in cleartext.
CVE-2012-1923 is primarily a local vulnerability, requiring a local user to access the password database.