CVE-2018-25256
Buffer Overflow in IP TOOLS SNMP Scanner Causes DoS
Publication date: 2026-04-05
Last updated on: 2026-04-27
Assigner: VulnCheck
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| ks-soft | ip-tools | to 2.50 (inc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-787 | The product writes data past the end, or before the beginning, of the intended buffer. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability exists in IP TOOLS 2.50 within the SNMP Scanner component. It is a local buffer overflow issue that occurs when a local attacker inputs oversized data into the 'From Addr' and 'To Addr' fields. By doing so and clicking the Start button, the attacker can cause the application to crash and potentially overwrite the Structured Exception Handler (SEH).
How can this vulnerability impact me? :
The primary impact of this vulnerability is denial of service. An attacker can crash the application by supplying malicious input, causing it to stop functioning. Additionally, the SEH overwrite could potentially be leveraged for further exploitation, although the CVE description does not specify beyond the crash and denial of service.