<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Prime95 — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/products/prime95/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Wed, 29 Apr 2026 20:16:25 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/products/prime95/feed.xml" rel="self" type="application/rss+xml"/><item><title>Prime95 Local Buffer Overflow Vulnerability (CVE-2018-25299)</title><link>https://feed.craftedsignal.io/briefs/2026-04-prime95-overflow/</link><pubDate>Wed, 29 Apr 2026 20:16:25 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-prime95-overflow/</guid><description>Prime95 version 29.4b8 contains a local buffer overflow vulnerability, allowing attackers to execute arbitrary code by exploiting structured exception handling (SEH) mechanisms through a malicious payload in the PrimeNet proxy hostname field.</description><content:encoded><![CDATA[<p>Prime95 is a popular application used for finding Mersenne prime numbers, often employed for stress-testing computer hardware. Version 29.4b8 of Prime95 is vulnerable to a local buffer overflow (CVE-2018-25299). An attacker with local access can exploit this vulnerability to execute arbitrary code on the system. The vulnerability stems from insufficient input validation when handling the optional proxy hostname field within the PrimeNet connection settings. By providing an overly long string, an attacker can overwrite parts of the process memory, specifically the Structured Exception Handling (SEH) chain. This allows them to redirect the flow of execution to attacker-controlled code, leading to arbitrary command execution. This vulnerability was published on April 29, 2026, and poses a significant risk to systems running the vulnerable software.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker gains local access to a system running Prime95 29.4b8.</li>
<li>The attacker modifies the PrimeNet connection settings within Prime95.</li>
<li>The attacker supplies a malicious payload within the optional &ldquo;proxy hostname&rdquo; field, exceeding the expected buffer size.</li>
<li>When Prime95 attempts to process the overly long proxy hostname, a buffer overflow occurs.</li>
<li>The overflow overwrites the Structured Exception Handling (SEH) record on the stack.</li>
<li>When an exception occurs within Prime95 (triggered intentionally or unintentionally), the overwritten SEH record points to attacker-controlled code.</li>
<li>The system attempts to handle the exception, causing execution to jump to the attacker-controlled code injected via the proxy hostname.</li>
<li>The attacker&rsquo;s code executes with the privileges of the Prime95 process, potentially leading to system compromise.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this vulnerability allows an attacker to execute arbitrary code on the affected system. This can lead to complete system compromise, data theft, or installation of malware. Since the vulnerability is local, an attacker needs prior access to the system, either through social engineering, stolen credentials, or other means. However, once access is obtained, exploitation is relatively straightforward. This vulnerability has a high CVSS score of 8.4, reflecting the significant potential impact.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade to a patched version of Prime95 that addresses CVE-2018-25299. Check the vendor&rsquo;s website (<a href="https://www.mersenne.org/download/#download">https://www.mersenne.org/download/#download</a>) for updates.</li>
<li>Implement strong input validation on any configuration files or settings that Prime95 reads to prevent buffer overflows.</li>
<li>Monitor process creation events for unusual activity originating from the Prime95 executable, which could indicate exploitation. Deploy the Sigma rule provided to detect suspicious command line arguments.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>buffer-overflow</category><category>code-execution</category><category>cve-2018-25299</category></item></channel></rss>