<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Atomic Alarm Clock — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/products/atomic-alarm-clock/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata. Fed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Wed, 13 May 2026 16:19:10 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/products/atomic-alarm-clock/feed.xml" rel="self" type="application/rss+xml"/><item><title>Atomic Alarm Clock 6.3 Stack Overflow Vulnerability (CVE-2020-37221)</title><link>https://feed.craftedsignal.io/briefs/2026-05-cve-2020-37221-atomic-alarm-clock-stack-overflow/</link><pubDate>Wed, 13 May 2026 16:19:10 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-05-cve-2020-37221-atomic-alarm-clock-stack-overflow/</guid><description>Atomic Alarm Clock 6.3 is vulnerable to a stack overflow, allowing local attackers to execute arbitrary code by supplying a malicious string to the display name textbox in the Time Zones Clock configuration (CVE-2020-37221).</description><content:encoded><![CDATA[<p>Atomic Alarm Clock 6.3 is vulnerable to a stack overflow (CVE-2020-37221). A local attacker can exploit this vulnerability by crafting a malicious string and supplying it to the display name textbox in the Time Zones Clock configuration. Successful exploitation allows arbitrary code execution with the privileges of the application. The attacker leverages a structured exception handling (SEH) overwrite and encoded shellcode to bypass SafeSEH protections. This vulnerability was reported on May 13, 2026, and poses a risk to systems running the affected software, potentially leading to unauthorized access and control.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker gains local access to a system with Atomic Alarm Clock 6.3 installed.</li>
<li>The attacker opens the Atomic Alarm Clock application.</li>
<li>The attacker navigates to the Time Zones Clock configuration.</li>
<li>The attacker inputs a specially crafted, overly long string into the display name textbox. This string is designed to overflow the allocated buffer on the stack.</li>
<li>The crafted string includes an SEH overwrite, redirecting exception handling to the attacker&rsquo;s controlled memory space.</li>
<li>The crafted string also contains encoded shellcode.</li>
<li>When the application attempts to handle the overflow, the SEH overwrite triggers, transferring control to the attacker&rsquo;s shellcode.</li>
<li>The shellcode executes, allowing the attacker to perform arbitrary commands with application privileges.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this stack overflow vulnerability allows a local attacker to execute arbitrary code with the privileges of the Atomic Alarm Clock application. This can lead to complete compromise of the affected system, allowing the attacker to install malware, steal sensitive data, or perform other malicious activities. Due to the nature of the vulnerability, systems where Atomic Alarm Clock 6.3 is installed are at risk.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Monitor process creation events for suspicious processes launched by Atomic Alarm Clock, using the &ldquo;Atomic Alarm Clock Suspicious Process Creation&rdquo; Sigma rule.</li>
<li>Implement application whitelisting to restrict the execution of unauthorized applications.</li>
<li>Monitor for registry changes made by Atomic Alarm Clock, which could indicate malicious activity or persistence.</li>
<li>Upgrade to a patched version of Atomic Alarm Clock if available; otherwise, consider uninstalling the vulnerable software.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>cve-2020-37221</category><category>stack overflow</category><category>local privilege escalation</category></item></channel></rss>