<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>AllokSoft — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/vendors/alloksoft/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Wed, 29 Apr 2026 20:16:27 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/vendors/alloksoft/feed.xml" rel="self" type="application/rss+xml"/><item><title>Alloksoft Video Joiner Buffer Overflow Vulnerability (CVE-2018-25315)</title><link>https://feed.craftedsignal.io/briefs/2026-04-alloksoft-overflow/</link><pubDate>Wed, 29 Apr 2026 20:16:27 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-alloksoft-overflow/</guid><description>Alloksoft Video Joiner 4.6.1217 is vulnerable to a local buffer overflow (CVE-2018-25315) allowing attackers to execute arbitrary code via a crafted license name.</description><content:encoded><![CDATA[<p>Alloksoft Video Joiner version 4.6.1217 is susceptible to a buffer overflow vulnerability (CVE-2018-25315). This vulnerability allows a local attacker to execute arbitrary code on a vulnerable system. The attack involves crafting a malicious string and supplying it to the &ldquo;License Name&rdquo; field of the application during registration. Exploitation occurs due to the application&rsquo;s failure to properly validate the length of the input, allowing a buffer overflow to occur. The attacker leverages Structured Exception Handler (SEH) overwrite and injects shellcode to gain code execution in the context of the application. This vulnerability was reported in April 2026.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker gains local access to a system with Alloksoft Video Joiner 4.6.1217 installed.</li>
<li>The attacker identifies the &ldquo;License Name&rdquo; field within the application&rsquo;s registration process as a potential vulnerability point.</li>
<li>The attacker crafts a malicious string that exceeds the expected buffer size for the &ldquo;License Name&rdquo; field.</li>
<li>The malicious string includes an SEH overwrite payload, redirecting execution flow to the attacker&rsquo;s controlled memory.</li>
<li>The crafted string also contains shellcode designed to perform arbitrary code execution.</li>
<li>The attacker inputs the malicious string into the &ldquo;License Name&rdquo; field and submits the registration form.</li>
<li>The application attempts to process the oversized string, triggering a buffer overflow.</li>
<li>The SEH overwrite redirects execution to the injected shellcode, granting the attacker arbitrary code execution within the context of the Alloksoft Video Joiner process.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this buffer overflow vulnerability allows a local attacker to execute arbitrary code with the privileges of the Alloksoft Video Joiner application. This could lead to complete system compromise, data theft, or installation of malware. While the specific number of affected users is unknown, any system running the vulnerable version of the software is at risk.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Monitor process creations for <code>VideoJoiner.exe</code> spawning unusual child processes, indicative of code execution stemming from the overflow.</li>
<li>Consider deploying network egress rules to block connections originating from <code>VideoJoiner.exe</code> to external IPs to prevent command and control.</li>
<li>Implement application control policies to prevent the execution of unsigned or untrusted code within the context of <code>VideoJoiner.exe</code>.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>buffer-overflow</category><category>code-execution</category><category>cve-2018-25315</category><category>windows</category></item><item><title>Allok Video to DVD Burner Stack-Based Buffer Overflow Vulnerability (CVE-2018-25303)</title><link>https://feed.craftedsignal.io/briefs/2026-04-allok-video-buffer-overflow/</link><pubDate>Wed, 29 Apr 2026 20:16:25 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-allok-video-buffer-overflow/</guid><description>Allok Video to DVD Burner 2.6.1217 contains a stack-based buffer overflow vulnerability (CVE-2018-25303) in the License Name field, allowing a local attacker to execute arbitrary code by triggering a structured exception handler (SEH) overwrite.</description><content:encoded><![CDATA[<p>A stack-based buffer overflow vulnerability exists in Allok Video to DVD Burner version 2.6.1217. This vulnerability, identified as CVE-2018-25303, resides within the &ldquo;License Name&rdquo; field of the application. A local attacker can exploit this flaw by crafting a malicious input designed to overwrite the Structured Exception Handler (SEH). Successful exploitation enables the attacker to execute arbitrary code within the context of the application. The vulnerability was reported on 2026-04-29. This is important for defenders because successful exploitation can lead to complete system compromise on vulnerable machines.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker gains local access to a system with Allok Video to DVD Burner 2.6.1217 installed.</li>
<li>The attacker crafts a malicious input string consisting of 780 bytes of arbitrary data.</li>
<li>The attacker appends SEH chain pointers and shellcode to the crafted input string.</li>
<li>The attacker opens the Allok Video to DVD Burner application and navigates to the registration window.</li>
<li>The attacker pastes the malicious input string into the &ldquo;License Name&rdquo; field.</li>
<li>The application attempts to process the oversized input, triggering the buffer overflow.</li>
<li>The SEH is overwritten with the attacker&rsquo;s controlled pointers.</li>
<li>The shellcode is executed, giving the attacker arbitrary code execution on the system.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this vulnerability allows a local attacker to execute arbitrary code within the context of the Allok Video to DVD Burner application. This could lead to complete system compromise, including data theft, installation of malware, or other malicious activities. The vulnerability affects version 2.6.1217 of the software. The number of potential victims depends on the number of installations of the vulnerable software.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Monitor process creations for Allok Video to DVD Burner and unusual child processes using the process creation rule below.</li>
<li>Monitor for registry modifications performed by the vulnerable application that may indicate persistence.</li>
<li>Due to the age of the application, consider whether it should continue to be used within the environment.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>cve</category><category>buffer overflow</category><category>seh overwrite</category></item></channel></rss>