<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>VX Search — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/vendors/vx-search/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata. Fed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Sun, 17 May 2026 13:19:13 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/vendors/vx-search/feed.xml" rel="self" type="application/rss+xml"/><item><title>CVE-2018-25328 - VX Search 10.6.18 Local Buffer Overflow</title><link>https://feed.craftedsignal.io/briefs/2026-05-vx-search-buffer-overflow/</link><pubDate>Sun, 17 May 2026 13:19:13 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-05-vx-search-buffer-overflow/</guid><description>VX Search 10.6.18 contains a local buffer overflow vulnerability (CVE-2018-25328) that allows attackers to overwrite the instruction pointer by supplying an oversized string in the directory field, leading to arbitrary code execution with application privileges.</description><content:encoded><![CDATA[<p>VX Search 10.6.18 is vulnerable to a local buffer overflow (CVE-2018-25328). This vulnerability allows a local attacker to craft a malicious input file that, when processed by VX Search, overwrites the instruction pointer, resulting in arbitrary code execution within the context of the application. An oversized string supplied in the directory field is the trigger. The attacker needs to supply 271 bytes of junk data, followed by a return address, to achieve code execution. Exploitation requires the attacker to have the ability to supply a malicious input file to VX Search. Successful exploitation allows for arbitrary code execution with application privileges.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker crafts a malicious input file.</li>
<li>The malicious input file contains 271 bytes of junk data.</li>
<li>The malicious input file includes a return address following the junk data, pointing to attacker-controlled code.</li>
<li>The attacker delivers the malicious input file to the target system.</li>
<li>The victim user or process opens the malicious file within VX Search 10.6.18.</li>
<li>VX Search attempts to process the directory field within the file.</li>
<li>Due to the lack of bounds checking, the oversized string overwrites the buffer.</li>
<li>The return address is overwritten, causing the application to redirect execution flow to the attacker&rsquo;s code.</li>
<li>The attacker achieves arbitrary code execution within the context of VX Search.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this vulnerability (CVE-2018-25328) allows an attacker to execute arbitrary code on the target system with the privileges of the VX Search application. This could lead to complete system compromise, data exfiltration, or denial of service. There are no specific numbers of victims or targeted sectors provided in the source.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Apply available patches or upgrade to a non-vulnerable version of VX Search to remediate CVE-2018-25328.</li>
<li>Monitor file system events for suspicious file creations or modifications related to VX Search application directories to detect potential exploitation attempts.</li>
<li>Implement process monitoring to detect VX Search spawning unusual child processes, which could indicate successful code execution after a buffer overflow. Consider creating a Sigma rule based on process creation events.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>buffer-overflow</category><category>local-privilege-escalation</category><category>cve-2018-25328</category></item></channel></rss>