vendor:
Easy MOV Converter
by:
@abatchy17
7.5
CVSS
HIGH
Buffer Overflow
CWE
Product Name: Easy MOV Converter
Affected Version From: 1.4.24
Affected Version To: 1.4.24
Patch Exists: NO
Related CWE:
CPE:
Platforms Tested: Windows 7 SP1 32bit
2017
Easy MOV Converter 1.4.24 – ‘Enter User Name’ Field Buffer Overflow (SEH)
This exploit takes advantage of a buffer overflow vulnerability in the 'Enter User Name' field of Easy MOV Converter version 1.4.24. By pasting a specially crafted payload into this field, an attacker can overwrite the Structured Exception Handler (SEH) and gain control over the program's execution flow. The exploit uses a combination of a long string of 'A' characters, a short jump instruction, and a return address to redirect execution to the attacker's code. The payload included in this exploit launches the Windows calculator (calc.exe) as a proof of concept.
Mitigation:
The vendor does not provide a patch or mitigation for this vulnerability. Users are advised to avoid using the affected software or to apply alternative security measures.