XNSoft Nconvert 7.136 is vulnerable to Buffer Overflow. There is a User Mode Write AV via a crafted image file. Attackers could exploit this issue for a Denial of Service (DoS) or possibly to achieve code execution.
The product copies an input buffer to an output buffer without verifying that the size of the input buffer is less than the size of the output buffer, leading to a buffer overflow.
Link | Tags |
---|---|
https://github.com/mrtouch93/exploits/tree/main/NConvert7.136/User%20Mode%20Write%20AV | third party advisory exploit |
https://www.xnview.com/en/nconvert/ | product |
http://packetstormsecurity.com/files/175145/XNSoft-Nconvert-7.136-Buffer-Overflow-Denial-Of-Service.html | third party advisory vdb entry |
http://seclists.org/fulldisclosure/2023/Oct/15 | mailing list third party advisory exploit |