Vulnerability Description
Stack-based buffer overflow in RealNetworks RealPlayer before 16.0.3.51, and RealPlayer SP 1.0 through 1.1.5, allows remote attackers to execute arbitrary code via a crafted .rmp file.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Realnetworks | Realplayer | <= 16.0.2.32 |
| Realnetworks | Realplayer Sp | 1.0.0 |
Related Weaknesses (CWE)
References
- http://service.real.com/realplayer/security/08232013_player/en/Vendor Advisory
- http://www.kb.cert.org/vuls/id/246524US Government Resource
- http://www.securityfocus.com/bid/61989
- http://service.real.com/realplayer/security/08232013_player/en/Vendor Advisory
- http://www.kb.cert.org/vuls/id/246524US Government Resource
- http://www.securityfocus.com/bid/61989
FAQ
What is CVE-2013-4973?
CVE-2013-4973 is a vulnerability with a CVSS score of 9.3 (HIGH). Stack-based buffer overflow in RealNetworks RealPlayer before 16.0.3.51, and RealPlayer SP 1.0 through 1.1.5, allows remote attackers to execute arbitrary code via a crafted .rmp file.
How severe is CVE-2013-4973?
CVE-2013-4973 has been rated HIGH with a CVSS base score of 9.3/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2013-4973?
Check the references section above for vendor advisories and patch information. Affected products include: Realnetworks Realplayer, Realnetworks Realplayer Sp.