CVE-2019-25362

9.8 CRITICAL

📋 TL;DR

CVE-2019-25362 is a critical buffer overflow vulnerability in WMV to AVI MPEG DVD WMV Convertor 4.6.1217 that allows remote attackers to execute arbitrary code by crafting malicious license name and code fields. This affects users of this specific video conversion software version, potentially leading to complete system compromise.

💻 Affected Systems

Products:
  • WMV to AVI MPEG DVD WMV Convertor
Versions: 4.6.1217
Operating Systems: Windows
Default Config Vulnerable: ⚠️ Yes
Notes: Vulnerability exists in the license validation mechanism and requires user interaction to open malicious files or enter crafted license data.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Full system compromise with attacker gaining remote shell access (port 4444 bind shell), data theft, ransomware deployment, and persistent backdoor installation.

🟠

Likely Case

Attackers exploiting this to install malware, cryptocurrency miners, or credential stealers on vulnerable systems.

🟢

If Mitigated

Limited impact with proper network segmentation, application whitelisting, and user privilege restrictions preventing successful exploitation.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: CONFIRMED
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploit code is publicly available on Exploit-DB (47563, 47568) demonstrating bind shell payload on port 4444 with 6000-byte buffer overflow.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Unknown

Vendor Advisory: https://www.alloksoft.com/

Restart Required: No

Instructions:

1. Check vendor website for updated version. 2. Uninstall vulnerable version 4.6.1217. 3. Install patched version if available. 4. Consider alternative video conversion software.

🔧 Temporary Workarounds

Application Removal

windows

Uninstall the vulnerable software to eliminate the attack surface

Control Panel > Programs > Uninstall a program > Select 'WMV to AVI MPEG DVD WMV Convertor' > Uninstall

Network Blocking

windows

Block outbound connections on port 4444 to prevent bind shell communication

netsh advfirewall firewall add rule name="Block CVE-2019-25362" dir=out action=block protocol=TCP localport=4444

🧯 If You Can't Patch

  • Implement application whitelisting to prevent execution of unauthorized software
  • Restrict user privileges to standard user accounts (not administrator)

🔍 How to Verify

Check if Vulnerable:

Check installed programs for 'WMV to AVI MPEG DVD WMV Convertor' version 4.6.1217

Check Version:

wmic product where name="WMV to AVI MPEG DVD WMV Convertor" get version

Verify Fix Applied:

Confirm software is either updated to newer version or completely uninstalled

📡 Detection & Monitoring

Log Indicators:

  • Unusual process creation from video converter executable
  • Failed license validation attempts with long strings

Network Indicators:

  • Outbound connections to port 4444 from video converter process
  • Unusual network traffic patterns from converter application

SIEM Query:

process_name:"WMVConvertor.exe" AND (network_port:4444 OR process_cmdline:"*6000*" OR event_id:4688)

🔗 References

📤 Share & Export