CVE-2019-25645
Buffer Overflow in WinAVI Converter Causes Local Denial of Service
Publication date: 2026-03-24
Last updated on: 2026-03-24
Assigner: VulnCheck
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| winavi | ipod_3gp_mp4_psp_converter | 4.4.2 |
| winavi | ipod_3gp_mp4_psp_converter | to 4.4.2 (exc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-226 | The product releases a resource such as memory or a file so that it can be made available for reuse, but it does not clear or "zeroize" the information contained in the resource before the product performs a critical state transition or makes the resource available for reuse by other entities. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
[{'type': 'paragraph', 'content': 'CVE-2019-25645 is a denial of service vulnerability in WinAVI iPod/3GP/MP4/PSP Converter version 4.4.2. It occurs when the application processes specially crafted malformed AVI files containing an oversized buffer.'}, {'type': 'paragraph', 'content': 'A local attacker can create such a malicious AVI file and load it through the "Convert to iPhone" function, causing the application to crash due to improper handling of input files and a resulting buffer overflow condition.'}] [1, 2]
How can this vulnerability impact me? :
This vulnerability can cause the WinAVI converter application to crash, resulting in a denial of service.
An attacker with local access can exploit this by loading a specially crafted AVI file, which disrupts the normal operation of the software.
There is no indication of remote exploitation, privilege escalation, or code execution; the impact is limited to application unavailability.
How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:
I don't know
How can this vulnerability be detected on my network or system? Can you suggest some commands?
[{'type': 'paragraph', 'content': 'This vulnerability can be detected by attempting to reproduce the denial of service condition locally on the affected system. Specifically, a malicious AVI file with an oversized buffer can be generated and loaded into the WinAVI iPod/3GP/MP4/PSP Converter 4.4.2 application using the "Convert to iPhone" function to see if the application crashes.'}, {'type': 'paragraph', 'content': 'A known method involves using a Python script to create a malicious file named "Evil.avi" containing a buffer of 6000 "A" characters. Running this script and then opening the file in the vulnerable application will trigger the crash if the vulnerability is present.'}, {'type': 'list_item', 'content': 'Run the Python script to generate the malicious AVI file (e.g., "Evil.avi").'}, {'type': 'list_item', 'content': 'Open WinAVI.exe.'}, {'type': 'list_item', 'content': 'Select the "Convert to iPhone" option.'}, {'type': 'list_item', 'content': 'Load the generated "Evil.avi" file.'}, {'type': 'paragraph', 'content': 'If the application crashes upon loading the file, the vulnerability is present.'}] [1]
What immediate steps should I take to mitigate this vulnerability?
[{'type': 'paragraph', 'content': 'To mitigate this vulnerability, immediate steps include avoiding the use of the "Convert to iPhone" function with untrusted or unknown AVI files, especially those that could be malformed or crafted to exploit the buffer overflow.'}, {'type': 'paragraph', 'content': 'Since the vulnerability requires local access, restricting user permissions and limiting access to the application can reduce the risk of exploitation.'}, {'type': 'paragraph', 'content': 'Additionally, consider updating the software if a patched version is available or replacing it with alternative software that does not have this vulnerability.'}] [2]