Description
River Past Ringtone Converter 2.7.6.1601 contains a local buffer overflow vulnerability that allows attackers to crash the application by supplying oversized input to activation fields. Attackers can paste 300 bytes of data into the Email textbox and Activation code textarea via the Help menu's Activate dialog to trigger a denial of service condition.
Problem types
Product status
Credits
Rafael Pedrero
References
www.exploit-db.com/exploits/46312 (ExploitDB-46312)
www.riverpast.com/ (Official Product Homepage)
www.vulncheck.com/...-ringtone-converter-buffer-overflow-dos (VulnCheck Advisory: River Past Ringtone Converter 2.7.6.1601 Buffer Overflow DoS)