<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Aida64 — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/tags/aida64/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Tue, 24 Mar 2026 12:16:03 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/tags/aida64/feed.xml" rel="self" type="application/rss+xml"/><item><title>AIDA64 Business SEH Buffer Overflow Vulnerability (CVE-2019-25631)</title><link>https://feed.craftedsignal.io/briefs/2026-03-aida64-seh-overflow/</link><pubDate>Tue, 24 Mar 2026 12:16:03 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-03-aida64-seh-overflow/</guid><description>AIDA64 Business 5.99.4900 is vulnerable to a local Structured Exception Handling (SEH) buffer overflow (CVE-2019-25631) allowing attackers to execute arbitrary code by overwriting SEH pointers with malicious shellcode.</description><content:encoded>&lt;p>AIDA64 Business version 5.99.4900 is vulnerable to a structured exception handling (SEH) buffer overflow (CVE-2019-25631). A local attacker can exploit this vulnerability to execute arbitrary code with application privileges. The vulnerability stems from insufficient bounds checking when processing the SMTP display name field in the preferences or report wizard functionality. An attacker can inject malicious shellcode, specifically egg hunter shellcode, into this field to overwrite SEH…&lt;/p>
</content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>cve-2019-25631</category><category>buffer-overflow</category><category>seh</category><category>aida64</category><category>windows</category></item><item><title>AIDA64 Extreme 5.99.4900 Structured Exception Handler Buffer Overflow</title><link>https://feed.craftedsignal.io/briefs/2026-03-aida64-buffer-overflow/</link><pubDate>Tue, 24 Mar 2026 12:16:02 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-03-aida64-buffer-overflow/</guid><description>AIDA64 Extreme 5.99.4900 is vulnerable to a structured exception handler buffer overflow, allowing local attackers to execute arbitrary code by supplying a malicious CSV log file path through the Hardware Monitoring logging preferences.</description><content:encoded><![CDATA[<p>AIDA64 Extreme version 5.99.4900 is susceptible to a structured exception handler (SEH) buffer overflow vulnerability. This flaw enables a local attacker to execute arbitrary code on a targeted system. The attack vector involves crafting a malicious CSV log file path and configuring AIDA64&rsquo;s Hardware Monitoring logging preferences to utilize it. When the AIDA64 application attempts to process this specially crafted log file, it triggers a buffer overflow in the SEH, enabling the attacker to inject and execute arbitrary shellcode. This vulnerability poses a significant risk to systems running the affected AIDA64 version, potentially leading to complete system compromise by local users.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker gains local access to a system running AIDA64 Extreme 5.99.4900.</li>
<li>The attacker crafts a malicious CSV log file containing shellcode designed to exploit the SEH buffer overflow.</li>
<li>The attacker opens AIDA64 Extreme and navigates to the Hardware Monitoring logging preferences.</li>
<li>Within the logging preferences, the attacker specifies the path to the malicious CSV log file.</li>
<li>AIDA64 attempts to process the specified log file, triggering the buffer overflow.</li>
<li>The injected shellcode overwrites the structured exception handler.</li>
<li>When an exception occurs during log processing, the overwritten SEH redirects execution to the attacker&rsquo;s shellcode.</li>
<li>The attacker&rsquo;s shellcode executes arbitrary commands, potentially granting them full control of the system.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this vulnerability allows a local attacker to execute arbitrary code with the privileges of the AIDA64 process. This could lead to complete system compromise, data theft, or installation of malware. While the exploit requires local access, the severity is high due to the potential for privilege escalation and the ease with which a malicious log file path can be configured within the application.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Monitor process execution for AIDA64 (aida64.exe) attempting to access unusual or suspicious file paths, especially CSV files, using the <code>Detect AIDA64 Suspicious Log File Access</code> Sigma rule.</li>
<li>Enable file access monitoring to capture the file paths being accessed by AIDA64.</li>
<li>Apply appropriate access controls to prevent unauthorized local users from modifying AIDA64&rsquo;s logging preferences.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>aida64</category><category>buffer-overflow</category><category>vulnerability</category></item></channel></rss>