<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Seh Overflow — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/tags/seh-overflow/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Wed, 29 Apr 2026 20:16:25 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/tags/seh-overflow/feed.xml" rel="self" type="application/rss+xml"/><item><title>Easy MPEG to DVD Burner 1.7.11 SEH Buffer Overflow</title><link>https://feed.craftedsignal.io/briefs/2026-04-easy-mpeg-seh-overflow/</link><pubDate>Wed, 29 Apr 2026 20:16:25 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-easy-mpeg-seh-overflow/</guid><description>Easy MPEG to DVD Burner 1.7.11 contains a structured exception handling (SEH) local buffer overflow vulnerability that allows local attackers to execute arbitrary code by supplying a malicious username string.</description><content:encoded><![CDATA[<p>Easy MPEG to DVD Burner 1.7.11 is vulnerable to a structured exception handling (SEH) local buffer overflow. This vulnerability allows a local attacker to execute arbitrary code on a targeted system. The vulnerability can be triggered by supplying a malicious username string to the application. The attacker exploits this vulnerability by overwriting the SEH handler, redirecting execution flow to attacker-controlled shellcode, which can then execute arbitrary commands. This vulnerability exists due to insufficient bounds checking when handling user-supplied data, specifically the username. Successful exploitation allows for arbitrary code execution within the context of the application.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker crafts a malicious input string designed to trigger a buffer overflow in Easy MPEG to DVD Burner 1.7.11.</li>
<li>The malicious string includes junk data to fill the buffer, SEH chain pointers to control the exception handling process, and shellcode containing the attacker&rsquo;s desired commands.</li>
<li>The attacker provides the crafted input as a username during application execution, likely via a configuration file or command-line argument.</li>
<li>The application&rsquo;s vulnerable code attempts to copy the attacker-controlled username into a fixed-size buffer without proper bounds checking.</li>
<li>The buffer overflows, overwriting the SEH handler with the attacker-controlled SEH chain pointers.</li>
<li>An exception is triggered within the application due to the buffer overflow, causing the SEH handler to be invoked.</li>
<li>The overwritten SEH handler redirects execution to the attacker&rsquo;s shellcode.</li>
<li>The shellcode executes arbitrary commands, such as launching calc.exe, giving the attacker control over the system.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this vulnerability allows a local attacker to execute arbitrary code with the privileges of the user running Easy MPEG to DVD Burner 1.7.11. This can lead to complete system compromise, data theft, or denial of service. While there is no mention of the number of victims or specific sectors targeted in the provided document, the high CVSS score (8.4) indicates a significant risk. The impact would allow lateral movement and further compromise.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Block execution of Easy MPEG to DVD Burner 1.7.11 if it is not a required application.</li>
<li>Monitor process creations for unusual processes originating from Easy MPEG to DVD Burner using the process creation rule below.</li>
<li>Monitor for unexpected process execution, such as calc.exe (mentioned in the advisory), following the execution of Easy MPEG to DVD Burner 1.7.11.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>buffer overflow</category><category>seh overflow</category><category>cve-2018-25301</category></item><item><title>River Past Video Cleaner 7.6.3 SEH Buffer Overflow Vulnerability</title><link>https://feed.craftedsignal.io/briefs/2026-04-river-past-seh-overflow/</link><pubDate>Sun, 05 Apr 2026 21:16:44 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-river-past-seh-overflow/</guid><description>River Past Video Cleaner 7.6.3 contains a structured exception handler buffer overflow vulnerability allowing local attackers to execute arbitrary code by providing a malicious string in the Lame_enc.dll field.</description><content:encoded><![CDATA[<p>River Past Video Cleaner version 7.6.3 is vulnerable to a structured exception handler (SEH) buffer overflow. This vulnerability allows a local attacker to execute arbitrary code on a vulnerable system. The attack involves crafting a malicious input string specifically designed to exploit the way the application handles exceptions related to the Lame_enc.dll library. This vulnerability can be exploited by an unauthenticated, local attacker. A successful exploit results in arbitrary code execution in the context of the application. Defenders should implement detection measures to identify malicious processes spawned by River Past Video Cleaner, or unexpected registry modifications.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>A local attacker crafts a malicious input file designed to trigger the buffer overflow.</li>
<li>The attacker places the crafted malicious file in a location accessible to River Past Video Cleaner.</li>
<li>The attacker executes River Past Video Cleaner and instructs it to process the malicious file.</li>
<li>River Past Video Cleaner attempts to load or process the Lame_enc.dll library.</li>
<li>Due to the malicious input, a buffer overflow occurs within the structured exception handler of Lame_enc.dll. This overflow overwrites the saved SEH record on the stack.</li>
<li>When an exception is triggered (as a result of the overflow), the overwritten SEH record is used.</li>
<li>The overwritten SEH record redirects execution to attacker-controlled shellcode.</li>
<li>The attacker&rsquo;s shellcode executes, potentially granting the attacker arbitrary code execution within the context of the River Past Video Cleaner process.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this vulnerability allows a local attacker to execute arbitrary code on the victim&rsquo;s machine. This could lead to complete system compromise, data theft, or installation of malware. The vulnerability is specific to River Past Video Cleaner 7.6.3. While specific victim counts are unavailable, the potential impact on any system running the vulnerable software is significant.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Monitor process creations where the parent process is <code>RiverPastVideoCleaner.exe</code>, and the child process is unusual or suspicious (e.g., <code>cmd.exe</code>, <code>powershell.exe</code>) using process creation logs (logsource: process_creation). Deploy the Sigma rule provided to detect potentially malicious child processes.</li>
<li>Implement application control policies to prevent the execution of unsigned or untrusted executables in directories associated with River Past Video Cleaner.</li>
<li>Monitor for unexpected registry modifications performed by <code>RiverPastVideoCleaner.exe</code> (logsource: registry_set). The provided Sigma rule detects potentially malicious registry modifications.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>cve-2019-25670</category><category>buffer-overflow</category><category>seh-overflow</category><category>windows</category></item><item><title>FlexHEX 2.71 Local Buffer Overflow Vulnerability (CVE-2019-25627)</title><link>https://feed.craftedsignal.io/briefs/2026-03-flexhex-overflow/</link><pubDate>Tue, 24 Mar 2026 12:16:02 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-03-flexhex-overflow/</guid><description>FlexHEX 2.71 is vulnerable to a local buffer overflow in the Stream Name field, allowing local attackers to execute arbitrary code via a structured exception handler (SEH) overflow.</description><content:encoded>&lt;p>FlexHEX 2.71 is susceptible to a local buffer overflow vulnerability (CVE-2019-25627) found within the Stream Name field. This flaw enables a local attacker to execute arbitrary code by exploiting a structured exception handler (SEH) overflow. The attack involves crafting a malicious text file containing precisely aligned shellcode and SEH chain pointers. By pasting this crafted content into the Stream Name dialog within FlexHEX, the attacker can trigger the SEH overflow and execute commands…&lt;/p>
</content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>buffer-overflow</category><category>seh-overflow</category><category>local-privilege-escalation</category><category>windows</category></item><item><title>Download Accelerator Plus (DAP) SEH Buffer Overflow Vulnerability</title><link>https://feed.craftedsignal.io/briefs/2026-03-dap-seh-overflow/</link><pubDate>Tue, 24 Mar 2026 12:16:02 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-03-dap-seh-overflow/</guid><description>Download Accelerator Plus DAP 10.0.6.0 is vulnerable to a structured exception handler buffer overflow, allowing remote attackers to execute arbitrary code via malicious crafted URLs by overwriting SEH pointers and executing embedded shellcode.</description><content:encoded><![CDATA[<p>Download Accelerator Plus (DAP) version 10.0.6.0 is susceptible to a critical structured exception handler (SEH) buffer overflow vulnerability, identified as CVE-2019-25628. This vulnerability allows remote attackers to achieve arbitrary code execution by crafting malicious URLs. The attack leverages the application&rsquo;s web page import functionality to introduce the malicious URL. Successful exploitation allows attackers to overwrite SEH pointers, redirecting execution flow to attacker-controlled shellcode. This vulnerability poses a significant risk to users of the affected DAP version, potentially leading to complete system compromise. The vulnerability was reported and analyzed by VulnCheck.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker crafts a malicious URL containing overflowing buffer data designed to overwrite the SEH pointers.</li>
<li>The victim uses the Download Accelerator Plus 10.0.6.0 application.</li>
<li>The attacker delivers the malicious URL to the victim via social engineering or other means.</li>
<li>The victim imports the malicious URL through the application&rsquo;s web page import functionality.</li>
<li>The application attempts to process the crafted URL, triggering the buffer overflow.</li>
<li>The overflowing buffer overwrites the structured exception handler (SEH) record on the stack.</li>
<li>When an exception occurs, the application attempts to use the overwritten SEH pointer.</li>
<li>Control is transferred to the attacker-controlled shellcode embedded in the malicious URL, leading to arbitrary code execution.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this vulnerability (CVE-2019-25628) allows a remote attacker to execute arbitrary code on the victim&rsquo;s system. Given the critical severity score (CVSS v3.1: 9.8), the impact is significant. Affected systems are completely compromised, allowing the attacker to install malware, steal sensitive information, or pivot to other systems on the network. The number of potential victims is unknown, but all users of Download Accelerator Plus 10.0.6.0 are at risk.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Discontinue the use of Download Accelerator Plus DAP 10.0.6.0 due to the unpatched SEH buffer overflow vulnerability (CVE-2019-25628).</li>
<li>Monitor network traffic for connections to the URLs associated with the vulnerability (e.g., <code>http://www.speedbit.com/dap/</code>, <code>https://www.exploit-db.com/exploits/46673</code>). Block these domains at the network perimeter.</li>
<li>Implement a network detection rule to identify HTTP requests containing unusually long URLs that might be exploiting the buffer overflow. This will require analyzing webserver or proxy logs.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>cve-2019-25628</category><category>buffer-overflow</category><category>seh-overflow</category></item><item><title>TuneClone 2.20 SEH Buffer Overflow Vulnerability (CVE-2019-25603)</title><link>https://feed.craftedsignal.io/briefs/2026-03-tuneclone-seh-overflow/</link><pubDate>Mon, 23 Mar 2026 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-03-tuneclone-seh-overflow/</guid><description>TuneClone 2.20 is vulnerable to a structured exception handler (SEH) buffer overflow, allowing local attackers to execute arbitrary code by supplying a malicious license code string via the application's license registration feature.</description><content:encoded>&lt;p>TuneClone 2.20 is susceptible to a structured exception handler (SEH) buffer overflow vulnerability identified as CVE-2019-25603. A local attacker can exploit this vulnerability by providing a specially crafted license code string to the application. The vulnerability exists due to insufficient bounds checking when processing the license code, allowing an attacker to overwrite the SEH chain. The attacker supplied input allows for arbitrary code execution by overwriting exception handlers…&lt;/p>
</content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>cve-2019-25603</category><category>seh-overflow</category><category>buffer-overflow</category><category>code-execution</category></item></channel></rss>