Description
AnyBurn 4.3 x86 contains a denial of service vulnerability that allows local attackers to crash the application by supplying an excessively long string to the image conversion function. Attackers can paste a large buffer into the source or destination image file fields and click Convert Now to trigger a crash.
Published: 2026-04-05
Score: 6.8 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Denial of Service
Action: Update
AI Analysis

Impact

AnyBurn 4.3 x86 includes a flaw in its image conversion routine that lets a local user supply an oversized string to either the source or destination image field, causing the program to crash when the conversion is executed. This denial of service can result in unplanned downtime and loss of service availability for the application, affecting any user who triggers an in‑process crash. The weakness is captured as CWE‑226, buffer over-read leading to an application termination. No compromise of confidentiality or integrity is expected because the vulnerability requires local interaction and merely stops the service. The impact is confined to the specific instance of AnyBurn running on the affected environment.

Affected Systems

The vulnerability affects the AnyBurn software, version 4.3, running on x86 platforms. No other product versions or operating systems are mentioned, and there is no additional vendor entanglement beyond the AnyBurn developer.

Risk and Exploitability

The severity is moderate with a CVSS score of 6.8, indicating that the flaw can be actively used by a local attacker. No EPSS data is provided, and the issue is not listed in the CISA KEV catalog. Because the attacker must have local access and must exercise the conversion feature with crafted input, the attack vector is inferred as local. The crash termination is deterministic when the buffer overflow occurs, and the exploit path is straightforward – providing a long string to the conversion dialog and pressing Convert Now. This simplicity increases the likelihood that skilled users could reproduce the crash, but the overall probability of widespread exploitation remains uncertain without a known exploit in the wild.

Generated by OpenCVE AI on April 5, 2026 at 23:29 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Check for an updated version of AnyBurn that addresses this crash and install it immediately.
  • If no update is available, restrict the use of the image conversion feature to trusted or administrative users only.
  • Configure the application to disable or remove the conversion functionality if it is not required for day‑to‑day operations.
  • Monitor system logs for abrupt termination events from AnyBurn and investigate suspicious activity.
  • Apply general system hardening, such as limiting local user privileges, to reduce the window of opportunity for local exploit attempts.

Generated by OpenCVE AI on April 5, 2026 at 23:29 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Mon, 20 Apr 2026 18:30:00 +0000

Type Values Removed Values Added
First Time appeared Anyburn anyburn
CPEs cpe:2.3:a:anyburn:anyburn:*:*:*:*:*:*:x86:*
Vendors & Products Anyburn anyburn

Tue, 07 Apr 2026 00:00:00 +0000

Type Values Removed Values Added
First Time appeared Anyburn
Anyburn anyburn X86
Vendors & Products Anyburn
Anyburn anyburn X86

Mon, 06 Apr 2026 16:45:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Sun, 05 Apr 2026 20:45:00 +0000

Type Values Removed Values Added
Description AnyBurn 4.3 x86 contains a denial of service vulnerability that allows local attackers to crash the application by supplying an excessively long string to the image conversion function. Attackers can paste a large buffer into the source or destination image file fields and click Convert Now to trigger a crash.
Title AnyBurn 4.3 x86 Denial of Service via Image Conversion
Weaknesses CWE-226
References
Metrics cvssV3_1

{'score': 5.5, 'vector': 'CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H'}

cvssV4_0

{'score': 6.8, 'vector': 'CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N'}


Subscriptions

Anyburn Anyburn Anyburn X86
cve-icon MITRE

Status: PUBLISHED

Assigner: VulnCheck

Published:

Updated: 2026-04-06T15:28:00.247Z

Reserved: 2026-04-05T12:42:44.717Z

Link: CVE-2019-25657

cve-icon Vulnrichment

Updated: 2026-04-06T15:08:20.428Z

cve-icon NVD

Status : Analyzed

Published: 2026-04-05T21:16:42.350

Modified: 2026-04-20T18:28:20.260

Link: CVE-2019-25657

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-06T21:56:20Z

Weaknesses