CVE-2020-37176

9.8 CRITICAL

📋 TL;DR

CVE-2020-37176 is a critical stack overflow vulnerability in Torrent 3GP Converter 1.51 that allows remote attackers to execute arbitrary code by exploiting Structured Exception Handler (SEH) overwrites. Attackers can craft malicious payloads targeting the registration dialog to achieve remote code execution, potentially compromising affected systems. Users running Torrent 3GP Converter 1.51 are affected.

💻 Affected Systems

Products:
  • Torrent 3GP Converter
Versions: Version 1.51
Operating Systems: Windows
Default Config Vulnerable: ⚠️ Yes
Notes: All installations of version 1.51 are vulnerable. The vulnerability is triggered through the registration dialog.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise with attacker gaining full control, installing malware, stealing data, and pivoting to other systems.

🟠

Likely Case

Attacker executes arbitrary code to install ransomware, cryptocurrency miners, or backdoors on vulnerable systems.

🟢

If Mitigated

Limited impact with proper network segmentation, application whitelisting, and exploit prevention controls in place.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: CONFIRMED
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploit code is publicly available on Exploit-DB (ID 47965) and demonstrates calculator execution as proof-of-concept.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Unknown

Vendor Advisory: No vendor advisory found

Restart Required: No

Instructions:

1. Uninstall Torrent 3GP Converter 1.51 completely
2. Find and install an alternative media converter application
3. Verify no residual files remain in Program Files and AppData directories

🔧 Temporary Workarounds

Application Removal

windows

Completely remove the vulnerable application from all systems

Control Panel > Programs > Uninstall a program > Select Torrent 3GP Converter > Uninstall

Network Blocking

windows

Block network access to the application using Windows Firewall

netsh advfirewall firewall add rule name="Block Torrent 3GP Converter" dir=out program="C:\Program Files\Torrent 3GP Converter\converter.exe" action=block

🧯 If You Can't Patch

  • Isolate affected systems on separate network segments with strict firewall rules
  • Implement application control/whitelisting to prevent unauthorized execution

🔍 How to Verify

Check if Vulnerable:

Check installed programs for 'Torrent 3GP Converter' version 1.51 via Control Panel or PowerShell: Get-WmiObject -Class Win32_Product | Where-Object {$_.Name -like '*Torrent 3GP Converter*'}

Check Version:

wmic product where name="Torrent 3GP Converter" get version

Verify Fix Applied:

Confirm application is no longer installed and no related processes are running

📡 Detection & Monitoring

Log Indicators:

  • Application crashes with exception codes
  • Unusual process creation from converter.exe
  • Network connections from converter.exe to suspicious IPs

Network Indicators:

  • Outbound connections from converter.exe on non-standard ports
  • Traffic patterns matching exploit payloads

SIEM Query:

process_name="converter.exe" AND (event_id=1000 OR event_id=1001) OR process_name="calc.exe" parent_process="converter.exe"

🔗 References

📤 Share & Export