CVE-2019-25665
Local Buffer Overflow in River Past Ringtone Converter Causes DoS
Publication date: 2026-04-05
Last updated on: 2026-04-27
Assigner: VulnCheck
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| river_past_ringtone_converter_project | river_past_ringtone_converter | to 2.7.6.1601 (inc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-787 | The product writes data past the end, or before the beginning, of the intended buffer. |
Attack-Flow Graph
AI Powered Q&A
How can this vulnerability impact me? :
The primary impact of this vulnerability is a denial of service condition. An attacker can exploit the buffer overflow to crash the River Past Ringtone Converter application, making it unavailable for legitimate users.
Can you explain this vulnerability to me?
This vulnerability exists in River Past Ringtone Converter version 2.7.6.1601 and is a local buffer overflow issue. It occurs when an attacker supplies oversized input to the activation fields of the application. Specifically, by pasting 300 bytes of data into the Email textbox and Activation code textarea via the Help menu's Activate dialog, the attacker can cause the application to crash.