CVE-2018-25242
Received Received - Intake
Denial of Service in Microsoft One Search via Input Overflow

Publication date: 2026-04-04

Last updated on: 2026-04-04

Assigner: VulnCheck

Description
One Search 1.1.0.0 contains a denial of service vulnerability that allows local attackers to crash the application by submitting excessively long input strings to the search functionality. Attackers can paste a buffer of 950 or more characters into the search bar to trigger an unhandled exception that crashes the application.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2026-04-04
Last Modified
2026-04-04
Generated
2026-05-06
AI Q&A
2026-04-04
EPSS Evaluated
2026-05-05
NVD
EUVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
microsoft one_search 1.1.0.0
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-1389 The product parses numeric input assuming base 10 (decimal) values, but it does not account for inputs that use a different base number (radix).
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

CVE-2018-25242 is a denial of service vulnerability in Microsoft One Search version 1.1.0.0 that allows local attackers to crash the application.

The vulnerability occurs when an attacker submits an excessively long input stringβ€”950 or more charactersβ€”into the search bar, which triggers an unhandled exception and causes the application to crash.

This issue arises from incorrect parsing of numbers with different radices (CWE-1389), leading to a buffer overflow condition.


How can this vulnerability impact me? :

This vulnerability can impact you by causing the Microsoft One Search application to crash unexpectedly when a specially crafted input is submitted.

Since the attack requires local access and no special privileges, an attacker with access to the system can disrupt availability of the application.

The impact is limited to availability, meaning the confidentiality and integrity of data are not affected, but the application becomes unusable until restarted.


How can this vulnerability be detected on my network or system? Can you suggest some commands?

This vulnerability can be detected by attempting to reproduce the crash condition locally on the affected Microsoft One Search application version 1.1.0.0 or earlier.

A practical detection method involves creating a payload of 950 or more characters (for example, 950 "A" characters), copying it to the clipboard, and pasting it into the search bar of the One Search application. If the application crashes, the vulnerability is present.

There are no specific network commands to detect this vulnerability since it requires local access and interaction with the application.

Example command to create the payload file using Python:

  • python -c "print('A'*950)" > PoC.txt

Then open PoC.txt, copy its contents to the clipboard, and paste into the One Search application's search bar to test for the crash.


How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:

This vulnerability is a denial of service issue that affects the availability of the Microsoft One Search application by allowing local attackers to crash it through excessively long input strings.

Since the vulnerability does not impact confidentiality or integrity of data, but only availability, its direct effect on compliance with standards like GDPR or HIPAAβ€”which primarily focus on protecting personal data confidentiality and integrityβ€”is limited.

However, availability is also a component of many security frameworks, so repeated exploitation could potentially affect compliance related to service availability requirements.


What immediate steps should I take to mitigate this vulnerability?

Immediate mitigation steps include restricting local access to the Microsoft One Search application to trusted users only, as the vulnerability requires local access to exploit.

Avoid pasting or entering excessively long input strings (950 or more characters) into the search bar of the application.

Monitor for application crashes and consider disabling or uninstalling the vulnerable version of Microsoft One Search until a patch or update is available.

Since the vulnerability is local and requires no privileges, limiting user permissions and educating users about this issue can help reduce risk.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart