CVE-2018-25274
Denial of Service in InfraRecorder 0.53 via Malicious Import
Publication date: 2026-04-26
Last updated on: 2026-04-26
Assigner: VulnCheck
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| portableapps | infrarecorder | 0.53 |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-789 | The product allocates memory based on an untrusted, large size value, but it does not ensure that the size is within expected limits, allowing arbitrary amounts of memory to be allocated. |
Attack-Flow Graph
AI Powered Q&A
How can this vulnerability impact me? :
The impact of this vulnerability is a denial of service (DoS) condition on the InfraRecorder application.
An attacker with local access can cause the application to crash by importing a maliciously crafted text file, potentially disrupting normal use of the software.
Can you explain this vulnerability to me?
This vulnerability exists in InfraRecorder version 0.53 and is a denial of service issue. It allows local attackers to crash the application by importing a specially crafted text file.
Specifically, an attacker can create a text file containing 6000 bytes of data and import it through the Edit menu's Import function, which triggers the application to crash.
How can this vulnerability be detected on my network or system? Can you suggest some commands?
This vulnerability involves a denial of service in InfraRecorder 0.53 triggered by importing a maliciously crafted text file containing 6000 bytes of data through the Edit menu's Import function.
Detection would involve verifying if the InfraRecorder application is present and at version 0.53, and testing whether importing a text file of approximately 6000 bytes causes the application to crash.
No specific commands or network detection methods are provided in the available information.
What immediate steps should I take to mitigate this vulnerability?
Immediate mitigation steps include avoiding importing text files of suspicious size or origin through the Edit menu's Import function in InfraRecorder 0.53.
Since the vulnerability requires local access to trigger, restricting local user permissions and monitoring usage of the Import function may help reduce risk.
No specific patches or updates are mentioned in the provided information.