Description
WinMPG Video Convert 9.3.5 and older versions contain a buffer overflow vulnerability in the registration dialog that allows local attackers to crash the application by supplying oversized input. Attackers can paste a large payload of 6000 bytes into the Name and Registration Code field to trigger a denial of service condition.
Published: 2026-03-24
Score: 6.9 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Denial of Service
Action: Patch
AI Analysis

Impact

A buffer overflow exists in the registration dialog of WinMPG Video Convert version 9.3.5 and earlier. When a local attacker supplies an oversized input of about 6000 bytes into the Name and Registration Code fields, the application crashes, leading to a denial of service. This vulnerability falls under CWE‑787 – Buffer Dependent Memory Leak/Overrun and does not provide any remote code execution or privilege escalation. It simply stops the application from functioning until restarted.

Affected Systems

The issue affects WinMPG Video Convert 9.3.5 and all earlier releases shipped by Winmpg. No remote systems are dedicated; any local user who can launch or interact with the registration dialog is potentially able to trigger the crash on the affected machine. The vulnerability is confined to the Windows desktop environment where the application runs.

Risk and Exploitability

With a CVSS base score of 6.9, the vulnerability is considered moderate severity. The EPSS score is not available, but because it requires local user interaction, the likelihood of exploitation depends on whether an attacker can accomplish the input overflow on a user’s machine. It is not listed in the CISA KEV catalog, and no known public exploit code currently exists. Nonetheless, the exploitation path is simple – a local attacker can paste a crafted string into the dialog to crash the software, so it should be treated as a high priority for patching in environments that rely on uninterrupted video conversion.

Generated by OpenCVE AI on March 24, 2026 at 12:21 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Obtain and install the latest official update or fix from Winmpg for WinMPG Video Convert, or upgrade to a version that no longer contains this flaw.
  • If no update is available, remove or disable the application from systems where it is not essential to reduce the risk of local denial of service.
  • Implement user‑access controls to limit who can run the application or interact with its registration dialog, thereby reducing the opportunity for exploitation.

Generated by OpenCVE AI on March 24, 2026 at 12:21 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Tue, 21 Apr 2026 16:45:00 +0000

Type Values Removed Values Added
First Time appeared Direct-soft
Direct-soft winmpg Video Convert
CPEs cpe:2.3:a:direct-soft:winmpg_video_convert:*:*:*:*:*:*:*:*
Vendors & Products Direct-soft
Direct-soft winmpg Video Convert

Thu, 26 Mar 2026 13:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Wed, 25 Mar 2026 12:00:00 +0000

Type Values Removed Values Added
First Time appeared Winmpg
Winmpg winmpg Video Convert Local Dos Exploit
Vendors & Products Winmpg
Winmpg winmpg Video Convert Local Dos Exploit

Tue, 24 Mar 2026 11:45:00 +0000

Type Values Removed Values Added
Description WinMPG Video Convert 9.3.5 and older versions contain a buffer overflow vulnerability in the registration dialog that allows local attackers to crash the application by supplying oversized input. Attackers can paste a large payload of 6000 bytes into the Name and Registration Code field to trigger a denial of service condition.
Title WinMPG Video Convert 9.3.5 Buffer Overflow Local Denial of Service
Weaknesses CWE-787
References
Metrics cvssV3_1

{'score': 6.2, 'vector': 'CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}

cvssV4_0

{'score': 6.9, 'vector': 'CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N'}


Subscriptions

Direct-soft Winmpg Video Convert
Winmpg Winmpg Video Convert Local Dos Exploit
cve-icon MITRE

Status: PUBLISHED

Assigner: VulnCheck

Published:

Updated: 2026-03-26T12:42:09.635Z

Reserved: 2026-03-24T11:06:06.066Z

Link: CVE-2019-25644

cve-icon Vulnrichment

Updated: 2026-03-26T12:42:03.384Z

cve-icon NVD

Status : Analyzed

Published: 2026-03-24T12:16:06.840

Modified: 2026-04-21T16:39:08.833

Link: CVE-2019-25644

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-03-25T20:39:27Z

Weaknesses