Bochs 2.6-5 contains a stack-based buffer overflow vulnerability that allows attackers to execute arbitrary code by supplying an oversized input string to the application. Attackers can craft a malicious payload with 1200 bytes of padding followed by a return-oriented programming chain to overwrite the instruction pointer and execute shell commands with application privileges.
Metrics
Affected Vendors & Products
References
History
Sat, 28 Mar 2026 12:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Bochs 2.6-5 contains a stack-based buffer overflow vulnerability that allows attackers to execute arbitrary code by supplying an oversized input string to the application. Attackers can craft a malicious payload with 1200 bytes of padding followed by a return-oriented programming chain to overwrite the instruction pointer and execute shell commands with application privileges. | |
| Title | Bochs 2.6-5 Buffer Overflow Remote Code Execution | |
| First Time appeared |
Bochs Project
Bochs Project bochs |
|
| Weaknesses | CWE-787 | |
| CPEs | cpe:2.3:a:bochs_project:bochs:2.6-5:*:*:*:*:*:*:* | |
| Vendors & Products |
Bochs Project
Bochs Project bochs |
|
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: VulnCheck
Published:
Updated: 2026-03-28T11:58:13.268Z
Reserved: 2026-03-28T11:46:46.215Z
Link: CVE-2018-25220
No data.
Status : Received
Published: 2026-03-28T12:16:02.600
Modified: 2026-03-28T12:16:02.600
Link: CVE-2018-25220
No data.
OpenCVE Enrichment
No data.