CVE-2019-25566
Buffer Overflow in TransMac 12.3 Volume Name Causes Crash
Publication date: 2026-03-21
Last updated on: 2026-04-16
Assigner: VulnCheck
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| acutesystems | transmac | 12.3 |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-787 | The product writes data past the end, or before the beginning, of the intended buffer. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
CVE-2019-25566 is a buffer overflow vulnerability in TransMac version 12.3 that occurs in the volume name field during disk image creation.
A local attacker can exploit this vulnerability by supplying an excessively long stringβsuch as a malicious file containing 1000 repeated charactersβinto the volume name field.
This causes an out-of-bounds write that crashes the application, resulting in a denial of service condition.
The exploit involves copying the crafted buffer to the clipboard and pasting it into the volume name input field when creating a new disk image, which triggers the crash.
How can this vulnerability impact me? :
This vulnerability can impact you by causing a denial of service (DoS) condition in the TransMac application.
An attacker with local access can crash the application by providing a specially crafted volume name, disrupting normal operations.
Since the vulnerability does not affect confidentiality or integrity, the main impact is unavailability of the application until it is restarted.
How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:
I don't know
How can this vulnerability be detected on my network or system? Can you suggest some commands?
[{'type': 'paragraph', 'content': 'This vulnerability can be detected by attempting to reproduce the crash condition in TransMac 12.3 by supplying an excessively long string in the volume name field during disk image creation.'}, {'type': 'paragraph', 'content': 'A practical detection method involves running a proof-of-concept exploit that uses a crafted buffer of 1000 repeated characters to trigger the application crash.'}, {'type': 'list_item', 'content': 'Run the provided Python script "TransMac.py" to generate a file named "TransMac.txt" containing the crafted buffer.'}, {'type': 'list_item', 'content': 'Copy the contents of "TransMac.txt" to the clipboard.'}, {'type': 'list_item', 'content': 'Open TransMac.exe, navigate to File > New Disk Image.'}, {'type': 'list_item', 'content': 'Paste the clipboard content into the "Volume name" input field.'}, {'type': 'list_item', 'content': 'Click "Ok" and save the new disk image (e.g., as "exploit.dmg").'}, {'type': 'paragraph', 'content': 'If TransMac crashes during this process, the vulnerability is present.'}] [1]
What immediate steps should I take to mitigate this vulnerability?
I don't know