CVE-2019-25665
Received Received - Intake
Local Buffer Overflow in River Past Ringtone Converter Causes DoS

Publication date: 2026-04-05

Last updated on: 2026-04-27

Assigner: VulnCheck

Description
River Past Ringtone Converter 2.7.6.1601 contains a local buffer overflow vulnerability that allows attackers to crash the application by supplying oversized input to activation fields. Attackers can paste 300 bytes of data into the Email textbox and Activation code textarea via the Help menu's Activate dialog to trigger a denial of service condition.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2026-04-05
Last Modified
2026-04-27
Generated
2026-05-07
AI Q&A
2026-04-06
EPSS Evaluated
2026-05-05
NVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
river_past_ringtone_converter_project river_past_ringtone_converter to 2.7.6.1601 (inc)
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-787 The product writes data past the end, or before the beginning, of the intended buffer.
Attack-Flow Graph
AI Powered Q&A
How can this vulnerability impact me? :

The primary impact of this vulnerability is a denial of service condition. An attacker can exploit the buffer overflow to crash the River Past Ringtone Converter application, making it unavailable for legitimate users.


Can you explain this vulnerability to me?

This vulnerability exists in River Past Ringtone Converter version 2.7.6.1601 and is a local buffer overflow issue. It occurs when an attacker supplies oversized input to the activation fields of the application. Specifically, by pasting 300 bytes of data into the Email textbox and Activation code textarea via the Help menu's Activate dialog, the attacker can cause the application to crash.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart