vendor:
Wav to MP3 Converter
by:
Robbie Corley
7,2
CVSS
HIGH
Buffer Overflow
119
CWE
Product Name: Wav to MP3 Converter
Affected Version From: N/A
Affected Version To: N/A
Patch Exists: NO
Related CWE: N/A
CPE: a:boxoft:wav_to_mp3_converter
Metasploit:
N/A
Other Scripts:
N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References:
N/A
Nuclei Metadata: N/A
Platforms Tested: Windows 7 Enterprise x64
2015
Boxoft wav to mp3 converter SEH bypass technique tested on Win7x64
A buffer overflow was found after constructing a .wav payload over 4000 characters and attempting to convert the payload to a .mp3 file. A jump to shellcode was used, followed by a pop pop retn. The shellcode used was a MessageBox shellcode from exploit-db.com.
Mitigation:
Ensure that all user input is validated and sanitized before being used in any operations.