<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Seh — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/tags/seh/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Wed, 29 Apr 2026 20:16:25 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/tags/seh/feed.xml" rel="self" type="application/rss+xml"/><item><title>Allok AVI to DVD SVCD VCD Converter Buffer Overflow Vulnerability</title><link>https://feed.craftedsignal.io/briefs/2026-04-allok-buffer-overflow/</link><pubDate>Wed, 29 Apr 2026 20:16:25 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-allok-buffer-overflow/</guid><description>Allok AVI to DVD SVCD VCD Converter 4.0.1217 is vulnerable to a SEH-based buffer overflow, allowing local attackers to execute arbitrary code by providing a malicious string in the License Name field.</description><content:encoded><![CDATA[<p>Allok AVI to DVD SVCD VCD Converter version 4.0.1217 is susceptible to a structured exception handling (SEH) based buffer overflow vulnerability. This vulnerability enables a local attacker to execute arbitrary code by crafting a specific payload. The attack involves providing a malicious string in the License Name field of the application. This can be exploited without requiring any prior authentication, making it a significant security concern for systems running the vulnerable software. The vulnerability was reported on April 29, 2026.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker prepares a malicious string payload consisting of junk data, an NSEH bypass, an SEH handler address, and shellcode.</li>
<li>The attacker opens the Allok AVI to DVD SVCD VCD Converter application.</li>
<li>The attacker navigates to the registration or license activation section of the software.</li>
<li>The attacker pastes the malicious string into the License Name field.</li>
<li>The attacker clicks the &ldquo;Register&rdquo; button, triggering the buffer overflow.</li>
<li>The overflow overwrites the SEH frame, redirecting execution flow to the attacker-controlled NSEH bypass.</li>
<li>The NSEH bypass redirects execution to the SEH handler address, which points to the attacker&rsquo;s shellcode.</li>
<li>The shellcode executes, allowing the attacker to run arbitrary code on the system.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this buffer overflow vulnerability allows a local attacker to execute arbitrary code with the privileges of the user running the Allok AVI to DVD SVCD VCD Converter. This could lead to complete system compromise, data theft, or installation of malware. Given the ease of exploitation (no authentication required, local access only) this poses a significant risk to systems with the vulnerable software installed.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule <code>Allok AVI Converter SEH Buffer Overflow</code> to detect exploitation attempts based on process creation events.</li>
<li>Monitor for abnormal process execution originating from the Allok AVI to DVD SVCD VCD Converter application to identify potential exploitation (process_creation).</li>
<li>Consider removing the Allok AVI to DVD SVCD VCD Converter 4.0.1217 until a patch is available, due to the high severity and ease of exploitation.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>buffer-overflow</category><category>seh</category><category>cve-2018-25302</category></item><item><title>RealTerm Serial Terminal SEH Buffer Overflow Vulnerability (CVE-2019-25679)</title><link>https://feed.craftedsignal.io/briefs/2026-04-realterm-seh-overflow/</link><pubDate>Sun, 05 Apr 2026 21:16:46 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-realterm-seh-overflow/</guid><description>RealTerm Serial Terminal 2.0.0.70 contains a structured exception handling (SEH) buffer overflow vulnerability allowing local attackers to execute arbitrary code by supplying a malicious payload via the Echo Port tab.</description><content:encoded><![CDATA[<p>RealTerm Serial Terminal version 2.0.0.70 is vulnerable to a structured exception handling (SEH) buffer overflow in the Echo Port tab. This vulnerability, identified as CVE-2019-25679, allows a local attacker to execute arbitrary code on a vulnerable system. The attack requires the user to be running the RealTerm application. The attacker must craft a malicious payload containing shellcode and a POP POP RET gadget chain and paste it into the Port field within the Echo Port tab. Subsequently, the attacker needs to induce the user to click the &ldquo;Change&rdquo; button, triggering the buffer overflow and allowing arbitrary code execution within the context of the RealTerm application. This poses a significant risk, particularly in environments where RealTerm is used for debugging or serial communication.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker identifies a vulnerable RealTerm Serial Terminal 2.0.0.70 installation.</li>
<li>The attacker crafts a malicious payload containing shellcode and a POP POP RET gadget chain.</li>
<li>The attacker gains local access to the target system.</li>
<li>The attacker opens the RealTerm application and navigates to the Echo Port tab.</li>
<li>The attacker pastes the malicious payload into the Port field.</li>
<li>The attacker induces the user to click the &ldquo;Change&rdquo; button.</li>
<li>The buffer overflow occurs, overwriting the SEH handler.</li>
<li>The POP POP RET gadget chain is executed, redirecting control to the attacker&rsquo;s shellcode, resulting in arbitrary code execution.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this vulnerability (CVE-2019-25679) allows a local attacker to execute arbitrary code on the affected system. This could lead to complete system compromise, including data theft, installation of malware, or denial of service. Although specific victim counts and targeted sectors are not available, the widespread use of RealTerm in technical environments makes this a potentially significant threat.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the &ldquo;RealTerm SEH Overflow Attempt&rdquo; Sigma rule to detect suspicious process creation following the execution of RealTerm with a long string supplied as an argument.</li>
<li>Monitor process creations where the parent process name is Realterm.exe using the &ldquo;RealTerm Suspicious Child Process&rdquo; Sigma rule.</li>
<li>Although not directly available, consider network monitoring to detect anomalies should the attacker install malware after successful exploitation.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>cve-2019-25679</category><category>buffer-overflow</category><category>seh</category><category>local-code-execution</category><category>realterm</category></item><item><title>AIDA64 Business SEH Buffer Overflow Vulnerability (CVE-2019-25631)</title><link>https://feed.craftedsignal.io/briefs/2026-03-aida64-seh-overflow/</link><pubDate>Tue, 24 Mar 2026 12:16:03 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-03-aida64-seh-overflow/</guid><description>AIDA64 Business 5.99.4900 is vulnerable to a local Structured Exception Handling (SEH) buffer overflow (CVE-2019-25631) allowing attackers to execute arbitrary code by overwriting SEH pointers with malicious shellcode.</description><content:encoded>&lt;p>AIDA64 Business version 5.99.4900 is vulnerable to a structured exception handling (SEH) buffer overflow (CVE-2019-25631). A local attacker can exploit this vulnerability to execute arbitrary code with application privileges. The vulnerability stems from insufficient bounds checking when processing the SMTP display name field in the preferences or report wizard functionality. An attacker can inject malicious shellcode, specifically egg hunter shellcode, into this field to overwrite SEH…&lt;/p>
</content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>cve-2019-25631</category><category>buffer-overflow</category><category>seh</category><category>aida64</category><category>windows</category></item><item><title>Lavavo CD Ripper 4.20 SEH Buffer Overflow Vulnerability</title><link>https://feed.craftedsignal.io/briefs/2026-03-lavavo-cd-ripper-seh-overflow/</link><pubDate>Mon, 23 Mar 2026 14:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-03-lavavo-cd-ripper-seh-overflow/</guid><description>Lavavo CD Ripper 4.20 is vulnerable to a structured exception handling (SEH) buffer overflow, allowing local attackers to execute arbitrary code by supplying a malicious string in the License Activation Name field leading to arbitrary code execution and a bind shell.</description><content:encoded><![CDATA[<p>Lavavo CD Ripper version 4.20 is susceptible to a critical structured exception handling (SEH) buffer overflow vulnerability. This vulnerability allows a local attacker to execute arbitrary code on a targeted system by crafting a malicious string and providing it as the License Activation Name. The vulnerability, identified as CVE-2019-25615, stems from insufficient bounds checking when handling the license activation data. Successful exploitation enables attackers to gain complete control over the affected system, potentially leading to data theft, system compromise, or further malicious activities within the local network. This poses a significant risk to users of Lavavo CD Ripper 4.20.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker prepares a malicious string crafted to exploit the SEH buffer overflow vulnerability in Lavavo CD Ripper 4.20. This string includes controlled buffer data, NSEH jump instructions, and SEH handler addresses.</li>
<li>The attacker launches Lavavo CD Ripper 4.20 on a vulnerable system.</li>
<li>The attacker navigates to the license activation section of the application.</li>
<li>The attacker enters the malicious string into the License Activation Name field.</li>
<li>The application processes the crafted input without proper bounds checking, resulting in a buffer overflow.</li>
<li>The overflow overwrites the SEH frame on the stack, replacing the standard SEH handler with the attacker-controlled SEH handler address.</li>
<li>An exception is triggered within the application, causing the program to jump to the attacker-controlled SEH handler.</li>
<li>The attacker&rsquo;s code is executed, which sets up a bind shell on port 3110, allowing the attacker to remotely connect and control the system.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of the SEH buffer overflow vulnerability in Lavavo CD Ripper 4.20 grants a local attacker the ability to execute arbitrary code with the privileges of the user running the application. This can lead to complete system compromise, including unauthorized access to sensitive data, installation of malware, and further lateral movement within the network. The bind shell on port 3110 provides a persistent backdoor for the attacker to maintain control over the compromised system.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Apply any available patches or updates for Lavavo CD Ripper to address CVE-2019-25615.</li>
<li>Implement application control mechanisms to prevent the execution of unauthorized or modified versions of Lavavo CD Ripper.</li>
<li>Deploy the Sigma rules below to detect potential exploitation attempts based on process creation (logsource: process_creation).</li>
<li>Monitor network connections for unexpected services listening on port 3110, which may indicate a successful bind shell (logsource: network_connection).</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>buffer-overflow</category><category>seh</category><category>cve-2019-25615</category><category>local-privilege-escalation</category><category>windows</category></item></channel></rss>