CVE-2020-37184
Allok Soft · Allok Video Converter
Allok Video Converter 4.6.1217 contains a stack overflow vulnerability in the License Name field, allowing attackers to execute arbitrary code via SEH handler overwrites.
Executive summary
A stack-based buffer overflow in Allok Video Converter allows an attacker to execute arbitrary system commands by providing a specially crafted payload in the License Name input field.
Vulnerability
This is a stack overflow vulnerability located in the License Name input field. By injecting malicious bytecode, an attacker can overwrite Structured Exception Handler (SEH) records to gain control of the execution flow and execute arbitrary code.
Business impact
Successful exploitation allows for full system compromise on the machine running the software. Given the CVSS score of 9.8, the risk is critical; an attacker could gain a foothold in the corporate network, install persistent malware, or steal sensitive user data.
Remediation
Immediate Action: Discontinue the use of Allok Video Converter version 4.6.1217 and update to the latest available version provided by the vendor.
Proactive Monitoring: Monitor endpoint detection and response (EDR) systems for unusual process spawning from the Allok Video Converter executable.
Compensating Controls: Implement application whitelisting and restrict administrative privileges for end-users to limit the impact of a successful software-based exploit.
Exploitation status
Public Exploit Available: No
Analyst recommendation
Because this vulnerability allows for remote code execution via a simple input field, it is classified as critical. Organizations should immediately identify and update or remove this software from all workstations to mitigate the risk of local privilege escalation or remote compromise.