<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Cve-2018-25258 — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/tags/cve-2018-25258/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Sun, 12 Apr 2026 13:16:31 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/tags/cve-2018-25258/feed.xml" rel="self" type="application/rss+xml"/><item><title>RGui 3.5.0 Local Buffer Overflow Vulnerability</title><link>https://feed.craftedsignal.io/briefs/2026-04-rgui-buffer-overflow/</link><pubDate>Sun, 12 Apr 2026 13:16:31 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-rgui-buffer-overflow/</guid><description>RGui 3.5.0 contains a local buffer overflow vulnerability in the GUI preferences dialog that allows attackers to bypass DEP protections through structured exception handling exploitation, leading to arbitrary code execution.</description><content:encoded><![CDATA[<p>RGui 3.5.0, a component of the R programming language distribution for Windows, is vulnerable to a local buffer overflow in its GUI preferences dialog. This vulnerability, identified as CVE-2018-25258, allows an attacker with local access to bypass Data Execution Prevention (DEP) and execute arbitrary code. The attack involves crafting malicious input to the &ldquo;Language for menus and messages&rdquo; field within the GUI preferences, triggering a stack-based buffer overflow. This overflow overwrites the Structured Exception Handler (SEH) record, enabling the attacker to redirect execution flow and execute a Return-Oriented Programming (ROP) chain. The ROP chain is then used to allocate memory using VirtualAlloc and ultimately execute arbitrary code. This vulnerability impacts systems running the affected version of RGui.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker gains local access to a Windows system running RGui 3.5.0.</li>
<li>The attacker opens the GUI preferences dialog within RGui.</li>
<li>The attacker inputs a specially crafted string into the &ldquo;Language for menus and messages&rdquo; field. This string is designed to overflow the buffer on the stack.</li>
<li>The buffer overflow overwrites the SEH record, replacing the legitimate handler address with the address of a ROP chain.</li>
<li>An exception occurs due to the overflow, triggering the SEH.</li>
<li>Instead of the legitimate exception handler, the attacker&rsquo;s ROP chain is executed.</li>
<li>The ROP chain calls VirtualAlloc to allocate a region of memory with execute permissions.</li>
<li>The attacker copies malicious code into the newly allocated memory and transfers control to it, achieving arbitrary code execution.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this vulnerability allows an attacker to execute arbitrary code with the privileges of the user running RGui. This could lead to the installation of malware, data theft, or complete system compromise. While the vulnerability requires local access, it represents a significant risk to systems where untrusted users have access to RGui. The vulnerability affects RGui version 3.5.0.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade to a later version of RGui that addresses the CVE-2018-25258 vulnerability if available.</li>
<li>Monitor process creations for <code>rgui.exe</code> spawning unusual child processes or making unexpected network connections, using a process creation log source.</li>
<li>Implement application whitelisting to prevent the execution of unauthorized programs.</li>
<li>Deploy the Sigma rule for detecting potential ROP chain execution to identify exploitation attempts.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>buffer-overflow</category><category>dep-bypass</category><category>rgui</category><category>cve-2018-25258</category><category>windows</category></item></channel></rss>