CVE-2018-25266
Received Received - Intake
Buffer Overflow in Angry IP Scanner 3.5.3 Causes DoS

Publication date: 2026-04-22

Last updated on: 2026-04-27

Assigner: VulnCheck

Description
Angry IP Scanner 3.5.3 contains a buffer overflow vulnerability in the preferences dialog that allows local attackers to crash the application by supplying an excessively large string. Attackers can generate a file containing a massive buffer of repeated characters and paste it into the unavailable value field in the display preferences to trigger a denial of service.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2026-04-22
Last Modified
2026-04-27
Generated
2026-05-07
AI Q&A
2026-04-22
EPSS Evaluated
2026-05-05
NVD
EUVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
angryip angry_ip_scanner 3.5.3
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-787 The product writes data past the end, or before the beginning, of the intended buffer.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

The vulnerability in Angry IP Scanner 3.5.3 is a buffer overflow in the preferences dialog. Local attackers can exploit this by supplying an excessively large string, which causes the application to crash. Specifically, attackers create a file with a massive buffer of repeated characters and paste it into an unavailable value field in the display preferences, triggering a denial of service.


How can this vulnerability impact me? :

This vulnerability can impact you by causing the Angry IP Scanner application to crash, resulting in a denial of service. Since the attack requires local access and involves crashing the application, it can disrupt your ability to use the software effectively.


What immediate steps should I take to mitigate this vulnerability?

To mitigate this vulnerability, avoid supplying excessively large strings in the preferences dialog of Angry IP Scanner 3.5.3, especially in the unavailable value field in the display preferences.

Since the vulnerability is triggered by local attackers pasting a massive buffer of repeated characters, restricting or monitoring local access to the application and educating users not to paste large strings into the preferences dialog can help prevent denial of service.


How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:

The vulnerability in Angry IP Scanner 3.5.3 is a local denial of service caused by a buffer overflow in the preferences dialog, which allows an attacker to crash the application by supplying an excessively large string.

This vulnerability impacts the availability of the application but does not affect confidentiality or integrity of data.

Since the vulnerability does not involve unauthorized access to or disclosure of personal or sensitive data, it does not directly impact compliance with data protection regulations such as GDPR or HIPAA.

However, denial of service incidents could indirectly affect operational availability requirements under some standards, but there is no explicit information linking this vulnerability to compliance violations.


How can this vulnerability be detected on my network or system? Can you suggest some commands?

This vulnerability is a local buffer overflow in Angry IP Scanner 3.5.3 that can be triggered by pasting an excessively large string into the preferences dialog. Detection involves verifying if the vulnerable version of Angry IP Scanner is installed and monitoring for crashes related to the preferences dialog.

There are no direct network detection commands since the vulnerability is local and triggered via the application's GUI preferences. However, you can check the installed version of Angry IP Scanner to determine if it is vulnerable.

  • On Windows, check the installed version by running: "ipscan.exe --version" or checking the application properties.
  • On Linux or Mac, run the command: ipscan --version

To test the vulnerability locally, you can use the provided Python script from the exploit to generate a large buffer file and attempt to reproduce the crash by pasting the content into the preferences dialog as described:

  • Run the Python script to create a file with a large buffer of repeated characters.
  • Open Angry IP Scanner, navigate to Tools > Preferences > Display tab.
  • Paste the large buffer content into the "The value is not available (no results):" input field and click OK.

If the application crashes, the vulnerability is present.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart