CVE-2018-25242
Denial of Service in Microsoft One Search via Input Overflow
Publication date: 2026-04-04
Last updated on: 2026-04-04
Assigner: VulnCheck
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| microsoft | one_search | 1.1.0.0 |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-1389 | The product parses numeric input assuming base 10 (decimal) values, but it does not account for inputs that use a different base number (radix). |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
CVE-2018-25242 is a denial of service vulnerability in Microsoft One Search version 1.1.0.0 that allows local attackers to crash the application.
The vulnerability occurs when an attacker submits an excessively long input stringβ950 or more charactersβinto the search bar, which triggers an unhandled exception and causes the application to crash.
This issue arises from incorrect parsing of numbers with different radices (CWE-1389), leading to a buffer overflow condition.
How can this vulnerability impact me? :
This vulnerability can impact you by causing the Microsoft One Search application to crash unexpectedly when a specially crafted input is submitted.
Since the attack requires local access and no special privileges, an attacker with access to the system can disrupt availability of the application.
The impact is limited to availability, meaning the confidentiality and integrity of data are not affected, but the application becomes unusable until restarted.
How can this vulnerability be detected on my network or system? Can you suggest some commands?
This vulnerability can be detected by attempting to reproduce the crash condition locally on the affected Microsoft One Search application version 1.1.0.0 or earlier.
A practical detection method involves creating a payload of 950 or more characters (for example, 950 "A" characters), copying it to the clipboard, and pasting it into the search bar of the One Search application. If the application crashes, the vulnerability is present.
There are no specific network commands to detect this vulnerability since it requires local access and interaction with the application.
Example command to create the payload file using Python:
- python -c "print('A'*950)" > PoC.txt
Then open PoC.txt, copy its contents to the clipboard, and paste into the One Search application's search bar to test for the crash.
How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:
This vulnerability is a denial of service issue that affects the availability of the Microsoft One Search application by allowing local attackers to crash it through excessively long input strings.
Since the vulnerability does not impact confidentiality or integrity of data, but only availability, its direct effect on compliance with standards like GDPR or HIPAAβwhich primarily focus on protecting personal data confidentiality and integrityβis limited.
However, availability is also a component of many security frameworks, so repeated exploitation could potentially affect compliance related to service availability requirements.
What immediate steps should I take to mitigate this vulnerability?
Immediate mitigation steps include restricting local access to the Microsoft One Search application to trusted users only, as the vulnerability requires local access to exploit.
Avoid pasting or entering excessively long input strings (950 or more characters) into the search bar of the application.
Monitor for application crashes and consider disabling or uninstalling the vulnerable version of Microsoft One Search until a patch or update is available.
Since the vulnerability is local and requires no privileges, limiting user permissions and educating users about this issue can help reduce risk.