Home

Description

River Past Ringtone Converter 2.7.6.1601 contains a local buffer overflow vulnerability that allows attackers to crash the application by supplying oversized input to activation fields. Attackers can paste 300 bytes of data into the Email textbox and Activation code textarea via the Help menu's Activate dialog to trigger a denial of service condition.

PUBLISHED Reserved 2026-04-05 | Published 2026-04-05 | Updated 2026-04-06 | Assigner VulnCheck




MEDIUM: 6.9CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
MEDIUM: 6.2CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

Problem types

Out-of-bounds Write

Product status

2.7.6.1601
affected

Credits

Rafael Pedrero finder

References

www.exploit-db.com/exploits/46312 (ExploitDB-46312) exploit

www.riverpast.com/ (Official Product Homepage) product

www.vulncheck.com/...-ringtone-converter-buffer-overflow-dos (VulnCheck Advisory: River Past Ringtone Converter 2.7.6.1601 Buffer Overflow DoS) third-party-advisory

cve.org (CVE-2019-25665)

nvd.nist.gov (CVE-2019-25665)

Download JSON