CVE-2018-25220

Bochs 2.6-5 contains a stack-based buffer overflow vulnerability that allows attackers to execute arbitrary code by supplying an oversized input string to the application. Attackers can craft a malicious payload with 1200 bytes of padding followed by a return-oriented programming chain to overwrite the instruction pointer and execute shell commands with application privileges.
Configurations

Configuration 1 (hide)

cpe:2.3:a:bochs_project:bochs:2.6.5:*:*:*:*:*:*:*

History

02 Apr 2026, 19:18

Type Values Removed Values Added
References () http://bochs.sourceforge.net/ - () http://bochs.sourceforge.net/ - Product
References () https://www.exploit-db.com/exploits/43979 - () https://www.exploit-db.com/exploits/43979 - Exploit, VDB Entry
References () https://www.vulncheck.com/advisories/bochs-5-buffer-overflow-remote-code-execution - () https://www.vulncheck.com/advisories/bochs-5-buffer-overflow-remote-code-execution - Third Party Advisory
Summary
  • (es) Bochs 2.6-5 contiene una vulnerabilidad de desbordamiento de búfer basado en pila que permite a los atacantes ejecutar código arbitrario al proporcionar una cadena de entrada sobredimensionada a la aplicación. Los atacantes pueden crear una carga útil maliciosa con 1200 bytes de relleno seguidos de una cadena de programación orientada a retorno para sobrescribir el puntero de instrucción y ejecutar comandos de shell con privilegios de aplicación.
First Time Bochs Project
Bochs Project bochs
CPE cpe:2.3:a:bochs_project:bochs:2.6.5:*:*:*:*:*:*:*

28 Mar 2026, 12:16

Type Values Removed Values Added
New CVE

Information

Published : 2026-03-28 12:16

Updated : 2026-04-02 19:18


NVD link : CVE-2018-25220

Mitre link : CVE-2018-25220

CVE.ORG link : CVE-2018-25220


JSON object : View

Products Affected

bochs_project

  • bochs
CWE
CWE-787

Out-of-bounds Write