CVE-2018-25289
Buffer Overflow in Softdisk 3.0.3 Registration Causes DoS
Publication date: 2026-04-26
Last updated on: 2026-04-26
Assigner: VulnCheck
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| softdisk | softdisk | 3.0.3 |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-120 | The product copies an input buffer to an output buffer without verifying that the size of the input buffer is less than the size of the output buffer. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
The vulnerability in Softdisk 3.0.3 is a buffer overflow in the registration code dialog. It occurs when a local attacker inputs an excessively large stringβspecifically a 6000-byte payloadβinto the Registration Name field accessed via the Help menu's Enter Registration Code dialog.
This oversized input causes the application to crash, leading to a denial of service condition.
How can this vulnerability impact me? :
This vulnerability can impact you by allowing a local attacker to crash the Softdisk application, causing a denial of service.
Since the attack requires local access and involves crashing the application, it can disrupt normal operations and availability of the software.