Description
WinMPG iPod Convert 3.0 contains a buffer overflow vulnerability in the Register dialog that allows local attackers to crash the application by supplying an oversized payload. Attackers can paste a large string of characters into the User Name and User Code field to trigger a denial of service condition.
Problem types
Product status
Credits
stresser
References
www.exploit-db.com/exploits/47131 (ExploitDB-47131)
www.vulncheck.com/...vert-register-field-buffer-overflow-dos (VulnCheck Advisory: WinMPG iPod Convert 3.0 Register Field Buffer Overflow DoS)