{"description":"Trending threats, MITRE ATT\u0026CK coverage, and detection metadata — refreshed continuously.","feed_url":"https://feed.craftedsignal.io/products/allok-video-to-dvd-burner-2.6.1217/","home_page_url":"https://feed.craftedsignal.io/","items":[{"_cs_actors":[],"_cs_cves":[{"cvss":8.4,"id":"CVE-2018-25303"}],"_cs_exploited":false,"_cs_products":["Allok Video to DVD Burner 2.6.1217"],"_cs_severities":["high"],"_cs_tags":["cve","buffer overflow","seh overwrite"],"_cs_type":"advisory","_cs_vendors":["AllokSoft"],"content_html":"\u003cp\u003eA stack-based buffer overflow vulnerability exists in Allok Video to DVD Burner version 2.6.1217. This vulnerability, identified as CVE-2018-25303, resides within the \u0026ldquo;License Name\u0026rdquo; field of the application. A local attacker can exploit this flaw by crafting a malicious input designed to overwrite the Structured Exception Handler (SEH). Successful exploitation enables the attacker to execute arbitrary code within the context of the application. The vulnerability was reported on 2026-04-29. This is important for defenders because successful exploitation can lead to complete system compromise on vulnerable machines.\u003c/p\u003e\n\u003ch2 id=\"attack-chain\"\u003eAttack Chain\u003c/h2\u003e\n\u003col\u003e\n\u003cli\u003eThe attacker gains local access to a system with Allok Video to DVD Burner 2.6.1217 installed.\u003c/li\u003e\n\u003cli\u003eThe attacker crafts a malicious input string consisting of 780 bytes of arbitrary data.\u003c/li\u003e\n\u003cli\u003eThe attacker appends SEH chain pointers and shellcode to the crafted input string.\u003c/li\u003e\n\u003cli\u003eThe attacker opens the Allok Video to DVD Burner application and navigates to the registration window.\u003c/li\u003e\n\u003cli\u003eThe attacker pastes the malicious input string into the \u0026ldquo;License Name\u0026rdquo; field.\u003c/li\u003e\n\u003cli\u003eThe application attempts to process the oversized input, triggering the buffer overflow.\u003c/li\u003e\n\u003cli\u003eThe SEH is overwritten with the attacker\u0026rsquo;s controlled pointers.\u003c/li\u003e\n\u003cli\u003eThe shellcode is executed, giving the attacker arbitrary code execution on the system.\u003c/li\u003e\n\u003c/ol\u003e\n\u003ch2 id=\"impact\"\u003eImpact\u003c/h2\u003e\n\u003cp\u003eSuccessful exploitation of this vulnerability allows a local attacker to execute arbitrary code within the context of the Allok Video to DVD Burner application. This could lead to complete system compromise, including data theft, installation of malware, or other malicious activities. The vulnerability affects version 2.6.1217 of the software. The number of potential victims depends on the number of installations of the vulnerable software.\u003c/p\u003e\n\u003ch2 id=\"recommendation\"\u003eRecommendation\u003c/h2\u003e\n\u003cul\u003e\n\u003cli\u003eMonitor process creations for Allok Video to DVD Burner and unusual child processes using the process creation rule below.\u003c/li\u003e\n\u003cli\u003eMonitor for registry modifications performed by the vulnerable application that may indicate persistence.\u003c/li\u003e\n\u003cli\u003eDue to the age of the application, consider whether it should continue to be used within the environment.\u003c/li\u003e\n\u003c/ul\u003e\n","date_modified":"2026-04-29T20:16:25Z","date_published":"2026-04-29T20:16:25Z","id":"/briefs/2026-04-allok-video-buffer-overflow/","summary":"Allok Video to DVD Burner 2.6.1217 contains a stack-based buffer overflow vulnerability (CVE-2018-25303) in the License Name field, allowing a local attacker to execute arbitrary code by triggering a structured exception handler (SEH) overwrite.","title":"Allok Video to DVD Burner Stack-Based Buffer Overflow Vulnerability (CVE-2018-25303)","url":"https://feed.craftedsignal.io/briefs/2026-04-allok-video-buffer-overflow/"}],"language":"en","title":"CraftedSignal Threat Feed — Allok Video to DVD Burner 2.6.1217","version":"https://jsonfeed.org/version/1.1"}