header-logo
Suggest Exploit
vendor:
jpegtoavi
by:
7.5
CVSS
HIGH
Buffer Overflow
119
CWE
Product Name: jpegtoavi
Affected Version From:
Affected Version To:
Patch Exists: NO
Related CWE:
CPE:
Metasploit:
Other Scripts:
Platforms Tested:

jpegtoavi Buffer Overflow Vulnerability

jpegtoavi is prone to a buffer overflow vulnerability when handling a malformed file list. This vulnerability can be exploited remotely to execute arbitrary code in the context of the user running the application.

Mitigation:

Apply vendor-supplied patches or upgrades to address this vulnerability. Avoid opening files from untrusted or unknown sources.
Source

Exploit-DB raw data:

source: https://www.securityfocus.com/bid/11976/info

jpegtoavi is prone to a buffer overflow. This issue is exposed when the software handles a malformed file list. As the list originates from an external or untrusted source, this issue is considered remote in nature.

If this vulnerability is successfully exploited, it will result in execution of arbitrary code in the context of the user running the application. 

https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/24981.zip