<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Seh-Overwrite — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/tags/seh-overwrite/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Wed, 29 Apr 2026 20:16:25 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/tags/seh-overwrite/feed.xml" rel="self" type="application/rss+xml"/><item><title>Free Download Manager 2.0 Built 417 Local Buffer Overflow Vulnerability</title><link>https://feed.craftedsignal.io/briefs/2026-04-fdm-buffer-overflow/</link><pubDate>Wed, 29 Apr 2026 20:16:25 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-fdm-buffer-overflow/</guid><description>Free Download Manager 2.0 Built 417 contains a local buffer overflow vulnerability in the URL import functionality that allows attackers to trigger a structured exception handler (SEH) chain exploitation, leading to arbitrary code execution.</description><content:encoded><![CDATA[<p>Free Download Manager (FDM) version 2.0 Built 417 is susceptible to a local buffer overflow vulnerability (CVE-2018-25304) within its URL import functionality. This vulnerability, discovered and reported by VulnCheck, allows an attacker to craft a malicious URL file. When a user imports this specially crafted file through the &ldquo;File &gt; Import &gt; Import lists of downloads&rdquo; menu, the application attempts to process the &lsquo;Location&rsquo; header response, triggering a buffer overflow. This overflow overwrites the Structured Exception Handler (SEH) chain, enabling the attacker to execute arbitrary code within the context of the FDM process. This vulnerability can be exploited locally by tricking a user into importing a malicious file.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker crafts a malicious <code>.url</code> file containing an overly long <code>Location</code> header value designed to cause a buffer overflow.</li>
<li>The victim is convinced to download the malicious <code>.url</code> file (e.g., through social engineering).</li>
<li>The victim opens Free Download Manager 2.0 Built 417.</li>
<li>The victim navigates to &ldquo;File &gt; Import &gt; Import lists of downloads&rdquo; within FDM.</li>
<li>The victim selects the downloaded malicious <code>.url</code> file and initiates the import process.</li>
<li>FDM parses the malicious <code>.url</code> file and attempts to process the long <code>Location</code> header.</li>
<li>The excessively long <code>Location</code> header causes a buffer overflow, overwriting the SEH chain.</li>
<li>When an exception is triggered (due to the overflow), the overwritten SEH chain is used to redirect execution to attacker-controlled code, resulting in arbitrary code execution.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this buffer overflow vulnerability allows an attacker to execute arbitrary code on the victim&rsquo;s system with the privileges of the Free Download Manager process. This could lead to complete system compromise, data theft, or installation of malware. While specific victim counts are unavailable, the vulnerability poses a significant risk to users of Free Download Manager 2.0 Built 417.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Monitor for process creation events originating from Free Download Manager after importing a <code>.url</code> file to detect potential exploitation attempts (see Sigma rule &ldquo;Detect Free Download Manager Suspicious Process Creation After Import&rdquo;).</li>
<li>Implement file integrity monitoring (FIM) on the Free Download Manager executable directory to detect unauthorized modifications potentially related to exploitation.</li>
<li>Consider using application control solutions to restrict the execution of unsigned or untrusted code within the Free Download Manager process.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>buffer-overflow</category><category>seh-overwrite</category><category>code-execution</category><category>cve-2018-25304</category></item><item><title>Allok Video to DVD Burner Stack-Based Buffer Overflow Vulnerability (CVE-2018-25303)</title><link>https://feed.craftedsignal.io/briefs/2026-04-allok-video-buffer-overflow/</link><pubDate>Wed, 29 Apr 2026 20:16:25 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-allok-video-buffer-overflow/</guid><description>Allok Video to DVD Burner 2.6.1217 contains a stack-based buffer overflow vulnerability (CVE-2018-25303) in the License Name field, allowing a local attacker to execute arbitrary code by triggering a structured exception handler (SEH) overwrite.</description><content:encoded><![CDATA[<p>A stack-based buffer overflow vulnerability exists in Allok Video to DVD Burner version 2.6.1217. This vulnerability, identified as CVE-2018-25303, resides within the &ldquo;License Name&rdquo; field of the application. A local attacker can exploit this flaw by crafting a malicious input designed to overwrite the Structured Exception Handler (SEH). Successful exploitation enables the attacker to execute arbitrary code within the context of the application. The vulnerability was reported on 2026-04-29. This is important for defenders because successful exploitation can lead to complete system compromise on vulnerable machines.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker gains local access to a system with Allok Video to DVD Burner 2.6.1217 installed.</li>
<li>The attacker crafts a malicious input string consisting of 780 bytes of arbitrary data.</li>
<li>The attacker appends SEH chain pointers and shellcode to the crafted input string.</li>
<li>The attacker opens the Allok Video to DVD Burner application and navigates to the registration window.</li>
<li>The attacker pastes the malicious input string into the &ldquo;License Name&rdquo; field.</li>
<li>The application attempts to process the oversized input, triggering the buffer overflow.</li>
<li>The SEH is overwritten with the attacker&rsquo;s controlled pointers.</li>
<li>The shellcode is executed, giving the attacker arbitrary code execution on the system.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this vulnerability allows a local attacker to execute arbitrary code within the context of the Allok Video to DVD Burner application. This could lead to complete system compromise, including data theft, installation of malware, or other malicious activities. The vulnerability affects version 2.6.1217 of the software. The number of potential victims depends on the number of installations of the vulnerable software.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Monitor process creations for Allok Video to DVD Burner and unusual child processes using the process creation rule below.</li>
<li>Monitor for registry modifications performed by the vulnerable application that may indicate persistence.</li>
<li>Due to the age of the application, consider whether it should continue to be used within the environment.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>cve</category><category>buffer overflow</category><category>seh overwrite</category></item><item><title>R i386 3.5.0 Local Buffer Overflow Vulnerability (CVE-2019-25656)</title><link>https://feed.craftedsignal.io/briefs/2026-04-r-buffer-overflow/</link><pubDate>Sun, 05 Apr 2026 21:16:42 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-r-buffer-overflow/</guid><description>R i386 version 3.5.0 is susceptible to a local buffer overflow in the GUI Preferences dialog, allowing a local attacker to overwrite the structured exception handler (SEH) by supplying a malicious string to the 'Language for menus and messages' field, leading to arbitrary code execution.</description><content:encoded><![CDATA[<p>R i386 version 3.5.0 contains a local buffer overflow vulnerability, identified as CVE-2019-25656, within the GUI Preferences dialog. This vulnerability allows a local attacker to achieve arbitrary code execution by exploiting a buffer overflow when the application processes user-supplied input in the &lsquo;Language for menus and messages&rsquo; field. By crafting a malicious payload string, an attacker can overwrite the Structured Exception Handler (SEH) records. Successful exploitation would allow attackers to execute arbitrary code with the privileges of the user running the application. This poses a significant risk to systems running this vulnerable version of R, potentially leading to complete system compromise.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker gains local access to a Windows system running R i386 3.5.0.</li>
<li>Attacker opens the R application.</li>
<li>Attacker navigates to the GUI Preferences dialog within the R application.</li>
<li>Attacker identifies the &lsquo;Language for menus and messages&rsquo; field within the GUI Preferences.</li>
<li>Attacker crafts a malicious payload string designed to overwrite SEH records, including shellcode for arbitrary code execution.</li>
<li>Attacker inputs the malicious string into the &lsquo;Language for menus and messages&rsquo; field.</li>
<li>The R application attempts to process the attacker-supplied string without proper bounds checking, triggering the buffer overflow.</li>
<li>The crafted payload overwrites the SEH record, redirecting execution flow to the attacker-controlled shellcode, resulting in arbitrary code execution.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this vulnerability allows a local attacker to execute arbitrary code on the targeted system. The impact includes potential privilege escalation, allowing the attacker to perform actions with the same privileges as the user running the R application. This could lead to the installation of malware, data exfiltration, or complete system compromise. While specific victim numbers are not available, any system running the vulnerable R i386 3.5.0 is at risk.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade R to a version higher than 3.5.0 to patch CVE-2019-25656.</li>
<li>Deploy the Sigma rule to detect the execution of R with a modified command line containing long strings to identify potential exploit attempts.</li>
<li>Monitor network connections originating from R processes for suspicious outbound traffic using network connection logs.</li>
<li>Implement the Sigma rule to detect abnormal process execution originating from the R application to catch potential exploitation attempts.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>buffer-overflow</category><category>seh-overwrite</category><category>code-execution</category><category>cve-2019-25656</category><category>windows</category></item><item><title>Base64 Decoder 1.1.2 Stack-Based Buffer Overflow (CVE-2019-25634)</title><link>https://feed.craftedsignal.io/briefs/2026-03-base64-decoder-overflow/</link><pubDate>Tue, 24 Mar 2026 12:16:04 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-03-base64-decoder-overflow/</guid><description>Base64 Decoder 1.1.2 is vulnerable to a stack-based buffer overflow (CVE-2019-25634) allowing local attackers to achieve arbitrary code execution via a crafted input file that triggers an SEH overwrite.</description><content:encoded>&lt;p>Base64 Decoder version 1.1.2 is susceptible to a stack-based buffer overflow vulnerability, identified as CVE-2019-25634. This flaw enables a local attacker to execute arbitrary code on a vulnerable system. The vulnerability arises from insufficient bounds checking when processing input, allowing an attacker to overwrite critical parts of the stack. Successful exploitation requires the attacker to craft a malicious input file specifically designed to trigger the overflow. The impact of this…&lt;/p>
</content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>cve-2019-25634</category><category>buffer-overflow</category><category>seh-overwrite</category><category>code-execution</category></item><item><title>DVDXPlayer Pro 5.5 Local Buffer Overflow Vulnerability (CVE-2019-25604)</title><link>https://feed.craftedsignal.io/briefs/2026-03-dvdxplayer-bof/</link><pubDate>Mon, 23 Mar 2026 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-03-dvdxplayer-bof/</guid><description>DVDXPlayer Pro 5.5 is vulnerable to a local buffer overflow, allowing local attackers to execute arbitrary code by crafting malicious playlist files.</description><content:encoded>&lt;p>DVDXPlayer Pro 5.5 is susceptible to a local buffer overflow vulnerability (CVE-2019-25604) that can be exploited by local attackers. This vulnerability allows for arbitrary code execution through the creation of specially crafted playlist files (.plf). The attack involves overflowing a buffer and hijacking the Structured Exception Handling (SEH) chain to execute attacker-controlled code within the context of the application. The vulnerability was reported in March 2026. Successful exploitation…&lt;/p>
</content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>buffer-overflow</category><category>seh-overwrite</category><category>cve-2019-25604</category><category>dvdxplayer</category></item></channel></rss>