CVE-2019-25564
Received Received - Intake
Buffer Overflow in PCHelpWareV2 1.0.0.5 Causes DoS Crash

Publication date: 2026-03-21

Last updated on: 2026-03-24

Assigner: VulnCheck

Description
PCHelpWareV2 1.0.0.5 contains a denial of service vulnerability that allows local attackers to crash the application by supplying an excessively long string in the Group field. Attackers can paste a buffer overflow payload into the Group property field and click Ok to trigger an application crash.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2026-03-21
Last Modified
2026-03-24
Generated
2026-05-07
AI Q&A
2026-03-21
EPSS Evaluated
2026-05-05
NVD
EUVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
uvnc pchelpwarev2 1.0.0.5
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-787 The product writes data past the end, or before the beginning, of the intended buffer.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

[{'type': 'paragraph', 'content': "CVE-2019-25564 is a denial of service vulnerability in PCHelpWareV2 version 1.0.0.5 and earlier. It occurs because the application does not properly handle excessively long input strings in the 'Group' field. A local attacker can supply a buffer overflow payload into this field and trigger an application crash by confirming the input."}, {'type': 'paragraph', 'content': 'The vulnerability exploits an out-of-bounds write condition (CWE-787) by pasting a crafted string into the Group property field and clicking Ok, which causes the application to crash.'}] [1, 3]


How can this vulnerability impact me? :

This vulnerability can impact you by causing a denial of service condition in the PCHelpWareV2 application. An attacker with local access can crash the application by exploiting the buffer overflow in the Group field, leading to application instability and unavailability.

Since the attack requires local access and user interaction, it may disrupt normal operations but does not allow for remote code execution or data compromise.


How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:

I don't know


How can this vulnerability be detected on my network or system? Can you suggest some commands?

[{'type': 'paragraph', 'content': 'This vulnerability can be detected by attempting to reproduce the crash condition in the PCHelpWare Viewer application. Specifically, a crafted buffer overflow payload consisting of an excessively long string (e.g., 100 "A" characters) can be pasted into the \'Group\' field of the application.'}, {'type': 'paragraph', 'content': 'A proof-of-concept Python script named "PCHelpWareV2.py" generates a file "PCHelpWareV2.txt" containing this crafted buffer. The detection procedure involves copying the contents of this file to the clipboard, opening the PCHelpWare Viewer, navigating to the Properties section, pasting the clipboard content into the \'Group\' field, and clicking \'Ok\'. If the application crashes, the vulnerability is present.'}, {'type': 'paragraph', 'content': 'No specific network commands are applicable since this is a local vulnerability triggered by user interaction within the application.'}] [1, 3]


What immediate steps should I take to mitigate this vulnerability?

[{'type': 'paragraph', 'content': "Immediate mitigation steps include avoiding the input of excessively long strings or buffer overflow payloads into the 'Group' field of the PCHelpWare Viewer application."}, {'type': 'paragraph', 'content': 'Since the vulnerability requires local user interaction, restricting access to the application to trusted users and limiting local access can reduce the risk.'}, {'type': 'paragraph', 'content': "Additionally, monitoring for application crashes related to the 'Group' field input can help identify exploitation attempts."}, {'type': 'paragraph', 'content': 'Check for updates or patches from the vendor (https://www.uvnc.com/home.html) that address this vulnerability and apply them as soon as they become available.'}] [1, 3]


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart