Impact
The vulnerability is a buffer overflow in the Register dialog of WinMPG iPod Convert 3.0, allowing a local attacker to crash the application by typing an oversized string into the User Name and User Code fields. The resulting denial of service occurs only while the user runs the application; no persistence, privilege elevation, or data theft is described. The weakness is identified as CWE-787 (Improper Validation of Buffer Size or Buffer Overflow).
Affected Systems
Affected product is WinMPG iPod Convert 3.0, as noted by the vendors list. No detailed affected‑version information is provided beyond the product name, so all releases of this version are potentially vulnerable.
Risk and Exploitability
The CVSS base score of 6.9 indicates moderate severity. The EPSS score of less than 1% suggests a low likelihood of exploitation in the current threat landscape, and the vulnerability is not listed in the CISA KEV catalog. Exploitation requires the attacker to have local access to a system running the application and the ability to paste a large payload into the user interface, which will terminate the application and possibly interrupt workflow. The risk is therefore limited to local denial of service but could be significant for critical operations relying on the application.
OpenCVE Enrichment