CVE-2020-37161

9.8 CRITICAL

📋 TL;DR

Wedding Slideshow Studio 1.36 contains a buffer overflow vulnerability in the registration name field that allows attackers to execute arbitrary code. This affects users running version 1.36 of the software, potentially allowing complete system compromise.

💻 Affected Systems

Products:
  • Wedding Slideshow Studio
Versions: 1.36
Operating Systems: Windows
Default Config Vulnerable: ⚠️ Yes
Notes: Vulnerability exists in default installation when processing registration name input.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Full system compromise with attacker gaining administrative privileges, installing malware, stealing data, and pivoting to other systems.

🟠

Likely Case

Local privilege escalation leading to unauthorized access, data theft, and potential ransomware deployment on affected systems.

🟢

If Mitigated

Limited impact with proper network segmentation and application sandboxing, potentially only affecting the application itself.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: CONFIRMED
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploit requires local access or social engineering to trigger the buffer overflow via registration name field.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Unknown

Vendor Advisory: http://www.wedding-slideshow-studio.com/

Restart Required: No

Instructions:

No official patch available. Consider upgrading to newer version if available or discontinuing use of vulnerable version.

🔧 Temporary Workarounds

Input Validation Enforcement

windows

Implement strict input validation for registration name field to prevent buffer overflow.

Not applicable - requires code modification

Application Sandboxing

windows

Run Wedding Slideshow Studio in a sandboxed environment to limit potential damage from exploitation.

Use Windows Sandbox or similar containerization

🧯 If You Can't Patch

  • Remove Wedding Slideshow Studio 1.36 from all systems and replace with alternative software
  • Implement strict network segmentation to isolate systems running vulnerable software

🔍 How to Verify

Check if Vulnerable:

Check software version in Help > About menu. If version is 1.36, system is vulnerable.

Check Version:

Check Help > About menu in Wedding Slideshow Studio application

Verify Fix Applied:

Verify software has been upgraded to version newer than 1.36 or completely removed from system.

📡 Detection & Monitoring

Log Indicators:

  • Unusual process creation from Wedding Slideshow Studio
  • Multiple failed registration attempts with long strings

Network Indicators:

  • Outbound connections from Wedding Slideshow Studio to unknown IPs
  • Unusual network traffic patterns from affected systems

SIEM Query:

Process Creation where Image contains 'wedding' AND CommandLine contains unusually long strings

🔗 References

📤 Share & Export