CVE-2020-37183

9.8 CRITICAL

📋 TL;DR

CVE-2020-37183 is a critical stack overflow vulnerability in Allok RM RMVB to AVI MPEG DVD Converter that allows remote code execution. Attackers can exploit this by crafting malicious input in the License Name field to overwrite SEH registers and execute arbitrary commands. Users of this specific converter software version are affected.

💻 Affected Systems

Products:
  • Allok RM RMVB to AVI MPEG DVD Converter
Versions: 3.6.1217
Operating Systems: Windows
Default Config Vulnerable: ⚠️ Yes
Notes: The vulnerability is triggered through the License Name input field during software registration/activation.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Full system compromise with attacker gaining complete control over the victim's machine, enabling data theft, ransomware deployment, or lateral movement within networks.

🟠

Likely Case

Local privilege escalation leading to arbitrary code execution with the privileges of the user running the vulnerable software, potentially enabling malware installation.

🟢

If Mitigated

Limited impact if software runs with minimal privileges in isolated environments, though code execution would still be possible within those constraints.

🌐 Internet-Facing: LOW
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: CONFIRMED
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploit requires user interaction to input malicious payload in License Name field. Proof-of-concept demonstrates calc.exe execution.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Not available

Vendor Advisory: Not available

Restart Required: No

Instructions:

No official patch available. Uninstall the vulnerable software and replace with alternative media conversion tools.

🔧 Temporary Workarounds

Remove vulnerable software

windows

Uninstall Allok RM RMVB to AVI MPEG DVD Converter 3.6.1217 completely from all systems

Control Panel > Programs > Uninstall a program > Select 'Allok RM RMVB to AVI MPEG DVD Converter' > Uninstall

Restrict software execution

windows

Use application control policies to block execution of the vulnerable converter

Using AppLocker or Windows Defender Application Control to create deny rules for the converter executable

🧯 If You Can't Patch

  • Run software with minimal user privileges (not as administrator)
  • Isolate affected systems from critical network segments and implement network segmentation

🔍 How to Verify

Check if Vulnerable:

Check installed programs for 'Allok RM RMVB to AVI MPEG DVD Converter' version 3.6.1217

Check Version:

wmic product where name="Allok RM RMVB to AVI MPEG DVD Converter" get version

Verify Fix Applied:

Confirm software is no longer installed or has been replaced with alternative media converter

📡 Detection & Monitoring

Log Indicators:

  • Process creation events for calc.exe or other unexpected executables from converter process
  • Application crash logs from the converter software

Network Indicators:

  • Outbound connections from converter process to unexpected destinations
  • Command and control traffic following exploitation

SIEM Query:

Process Creation where Image contains "Allok" AND (CommandLine contains "calc" OR ParentImage contains "Allok")

🔗 References

📤 Share & Export