{"$ref":"https://www.cert.ssi.gouv.fr/openapi.json","affected_systems":[],"affected_systems_content":"<P>Versions ant\u00e9rieures \u00e0 RealPlayer 16.0.0.282</P>","content":"## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l'\u00e9diteur pour l'obtention des\ncorrectifs (cf. section Documentation).\n","cves":[{"name":"CVE-2012-5690","url":"https://www.cve.org/CVERecord?id=CVE-2012-5690"},{"name":"CVE-2012-5691","url":"https://www.cve.org/CVERecord?id=CVE-2012-5691"}],"links":[{"title":"Bulletin de s\u00e9curit\u00e9 12142012_player du 14 novembre 2012 :","url":"http://service.real.com/realplayer/security/12142012_player/en/"}],"reference":"CERTA-2012-AVI-748","revisions":[{"description":"version initiale.","revision_date":"2012-12-18T00:00:00.000000"}],"risks":[{"description":"Ex\u00e9cution de code arbitraire \u00e0 distance"}],"summary":"Deux vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 corrig\u00e9es dans <span\nclass=\"textit\">RealPlayer</span>. La plus critique concerne un\nd\u00e9bordement de m\u00e9moire tampon au moyen d'un fichier sp\u00e9cialement con\u00e7u.\n","title":"Vuln\u00e9rabilit\u00e9s dans RealPlayer","vendor_advisories":[{"published_at":null,"title":"Bulletin de s\u00e9curit\u00e9 RealPlayer 12142012_player du 14 d\u00e9cembre 2012","url":null}]}
