7.8
HIGH
CVE-2017-8367
Ether Software Easy MOV Converter Denial of Service and SEH Overwrite Vulnerability
Description

Buffer overflow in Ether Software Easy MOV Converter 1.4.24, Easy DVD Creator, Easy MPEG/AVI/DIVX/WMV/RM to DVD, Easy Avi/Divx/Xvid to DVD Burner, Easy MPEG to DVD Burner, Easy WMV/ASF/ASX to DVD Burner, Easy RM RMVB to DVD Burner, Easy CD DVD Copy, MP3/AVI/MPEG/WMV/RM to Audio CD Burner, MP3/WAV/OGG/WMA/AC3 to CD Burner, MP3 WAV to CD Burner, My Video Converter, Easy AVI DivX Converter, Easy Video to iPod Converter, Easy Video to PSP Converter, Easy Video to 3GP Converter, Easy Video to MP4 Converter, and Easy Video to iPod/MP4/PSP/3GP Converter allows local attackers to cause a denial of service (SEH overwrite) or possibly have unspecified other impact via a long username.

INFO

Published Date :

April 30, 2017, 7:59 p.m.

Last Modified :

April 20, 2025, 1:37 a.m.

Remotely Exploitable :

No

Impact Score :

5.9

Exploitability Score :

1.8
Public PoC/Exploit Available at Github

CVE-2017-8367 has a 1 public PoC/Exploit available at Github. Go to the Public Exploits tab to see the list.

Affected Products

The following products are affected by CVE-2017-8367 vulnerability. Even if cvefeed.io is aware of the exact versions of the products that are affected, the information is not represented in the table below.

ID Vendor Product Action
1 Ether_software easy_avi\/divx\/xvid_to_dvd_burner
2 Ether_software easy_avi_divx_converter
3 Ether_software easy_cd_dvd_copy
4 Ether_software easy_dvd_creator
5 Ether_software easy_mov_converter
6 Ether_software easy_mpeg\/avi\/divx\/wmv\/rm_to_dvd
7 Ether_software easy_mpeg_to_dvd_burner
8 Ether_software easy_rm_rmvb_to_dvd_burner
9 Ether_software easy_video_to_3gp_converter
10 Ether_software easy_video_to_ipod\/mp4\/psp\/3gp_converter
11 Ether_software easy_video_to_ipod_converter
12 Ether_software easy_video_to_mp4_converter
13 Ether_software easy_video_to_psp_converter
14 Ether_software easy_wmv\/asf\/asx_to_dvd_burner
15 Ether_software mp3\/avi\/mpeg\/wmv\/rm_to_audio_cd_burner
16 Ether_software mp3\/wav\/ogg\/wma\/ac3_to_cd_burner
17 Ether_software mp3_wav_to_cd_burner
18 Ether_software my_video_converter
References to Advisories, Solutions, and Tools

Here, you will find a curated list of external links that provide in-depth information, practical solutions, and valuable tools related to CVE-2017-8367.

URL Resource
https://github.com/offensive-security/exploit-database/blob/master/platforms/windows/dos/41911.py Exploit Third Party Advisory
https://www.exploit-db.com/exploits/41911/ Third Party Advisory VDB Entry
https://github.com/offensive-security/exploit-database/blob/master/platforms/windows/dos/41911.py Exploit Third Party Advisory
https://www.exploit-db.com/exploits/41911/ Third Party Advisory VDB Entry

We scan GitHub repositories to detect new proof-of-concept exploits. Following list is a collection of public exploits and proof-of-concepts, which have been published on GitHub (sorted by the most recently updated).

None

Python

Updated: 3 years, 10 months ago
0 stars 0 fork 0 watcher
Born at : May 31, 2021, 6:27 p.m. This repo has been linked 2 different CVEs too.

Results are limited to the first 15 repositories due to potential performance issues.

The following list is the news that have been mention CVE-2017-8367 vulnerability anywhere in the article.

The following table lists the changes that have been made to the CVE-2017-8367 vulnerability over time.

Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability's severity, exploitability, or other characteristics.

  • CVE Modified by af854a3a-2127-422b-91ae-364da2661108

    Nov. 21, 2024

    Action Type Old Value New Value
    Added Reference https://github.com/offensive-security/exploit-database/blob/master/platforms/windows/dos/41911.py
    Added Reference https://www.exploit-db.com/exploits/41911/
  • CVE Modified by [email protected]

    May. 14, 2024

    Action Type Old Value New Value
  • Initial Analysis by [email protected]

    May. 17, 2017

    Action Type Old Value New Value
    Added CVSS V2 (AV:L/AC:L/Au:N/C:P/I:P/A:P)
    Added CVSS V3 AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
    Changed Reference Type https://github.com/offensive-security/exploit-database/blob/master/platforms/windows/dos/41911.py No Types Assigned https://github.com/offensive-security/exploit-database/blob/master/platforms/windows/dos/41911.py Exploit, Third Party Advisory
    Changed Reference Type https://www.exploit-db.com/exploits/41911/ No Types Assigned https://www.exploit-db.com/exploits/41911/ Third Party Advisory, VDB Entry
    Added CWE CWE-119
    Added CPE Configuration OR *cpe:2.3:a:ether_software:easy_avi\/divx\/xvid_to_dvd_burner:-:*:*:*:*:*:*:* *cpe:2.3:a:ether_software:easy_avi_divx_converter:-:*:*:*:*:*:*:* *cpe:2.3:a:ether_software:easy_cd_dvd_copy:-:*:*:*:*:*:*:* *cpe:2.3:a:ether_software:easy_dvd_creator:-:*:*:*:*:*:*:* *cpe:2.3:a:ether_software:easy_mov_converter:-:*:*:*:*:*:*:* *cpe:2.3:a:ether_software:easy_mov_converter:1.4.24:*:*:*:*:*:*:* *cpe:2.3:a:ether_software:easy_mpeg\/avi\/divx\/wmv\/rm_to_dvd:-:*:*:*:*:*:*:* *cpe:2.3:a:ether_software:easy_mpeg_to_dvd_burner:-:*:*:*:*:*:*:* *cpe:2.3:a:ether_software:easy_rm_rmvb_to_dvd_burner:-:*:*:*:*:*:*:* *cpe:2.3:a:ether_software:easy_video_to_3gp_converter:-:*:*:*:*:*:*:* *cpe:2.3:a:ether_software:easy_video_to_ipod\/mp4\/psp\/3gp_converter:-:*:*:*:*:*:*:* *cpe:2.3:a:ether_software:easy_video_to_ipod_converter:-:*:*:*:*:*:*:* *cpe:2.3:a:ether_software:easy_video_to_mp4_converter:-:*:*:*:*:*:*:* *cpe:2.3:a:ether_software:easy_video_to_psp_converter:-:*:*:*:*:*:*:* *cpe:2.3:a:ether_software:easy_wmv\/asf\/asx_to_dvd_burner:-:*:*:*:*:*:*:* *cpe:2.3:a:ether_software:mp3\/avi\/mpeg\/wmv\/rm_to_audio_cd_burner:-:*:*:*:*:*:*:* *cpe:2.3:a:ether_software:mp3\/wav\/ogg\/wma\/ac3_to_cd_burner:-:*:*:*:*:*:*:* *cpe:2.3:a:ether_software:mp3_wav_to_cd_burner:-:*:*:*:*:*:*:* *cpe:2.3:a:ether_software:my_video_converter:-:*:*:*:*:*:*:*
EPSS is a daily estimate of the probability of exploitation activity being observed over the next 30 days. Following chart shows the EPSS score history of the vulnerability.
Exploit Prediction

EPSS is a daily estimate of the probability of exploitation activity being observed over the next 30 days.

0.11 }} -4.98%

score

0.25929

percentile

CVSS30 - Vulnerability Scoring System
Attack Vector
Attack Complexity
Privileges Required
User Interaction
Scope
Confidentiality
Integrity
Availability
© cvefeed.io
Latest DB Update: Apr. 30, 2025 23:35