Bochs 2.6-5 contains a stack-based buffer overflow vulnerability that allows attackers to execute arbitrary code by supplying an oversized input string to the application. Attackers can craft a malicious payload with 1200 bytes of padding followed by a return-oriented programming chain to overwrite the instruction pointer and execute shell commands with application privileges.
References
| Link | Resource |
|---|---|
| http://bochs.sourceforge.net/ | Product |
| https://www.exploit-db.com/exploits/43979 | Exploit VDB Entry |
| https://www.vulncheck.com/advisories/bochs-5-buffer-overflow-remote-code-execution | Third Party Advisory |
Configurations
History
02 Apr 2026, 19:18
| Type | Values Removed | Values Added |
|---|---|---|
| References | () http://bochs.sourceforge.net/ - Product | |
| References | () https://www.exploit-db.com/exploits/43979 - Exploit, VDB Entry | |
| References | () https://www.vulncheck.com/advisories/bochs-5-buffer-overflow-remote-code-execution - Third Party Advisory | |
| Summary |
|
|
| First Time |
Bochs Project
Bochs Project bochs |
|
| CPE | cpe:2.3:a:bochs_project:bochs:2.6.5:*:*:*:*:*:*:* |
28 Mar 2026, 12:16
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2026-03-28 12:16
Updated : 2026-04-02 19:18
NVD link : CVE-2018-25220
Mitre link : CVE-2018-25220
CVE.ORG link : CVE-2018-25220
JSON object : View
Products Affected
bochs_project
- bochs
CWE
CWE-787
Out-of-bounds Write
