CVE-2018-25290
Buffer Overflow in Easyboot 6.6.0 Replace Text Causes DoS
Publication date: 2026-04-26
Last updated on: 2026-04-26
Assigner: VulnCheck
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| easyboot | easyboot | 6.6.0 |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-120 | The product copies an input buffer to an output buffer without verifying that the size of the input buffer is less than the size of the output buffer. |
Attack-Flow Graph
AI Powered Q&A
How can this vulnerability be detected on my network or system? Can you suggest some commands?
This vulnerability is triggered locally by using the Replace Text function in Easyboot 6.6.0 with an oversized string. Detection involves verifying if the application is vulnerable by attempting to reproduce the crash with a large payload in the Replace Text fields.
Since the vulnerability requires local interaction and specific application usage, network-based detection commands are not applicable.
No specific commands or automated detection methods are provided.
Can you explain this vulnerability to me?
This vulnerability exists in Easyboot version 6.6.0 within the Replace Text function. It is a buffer overflow issue that allows local attackers to crash the application by providing an oversized string.
Specifically, an attacker can trigger the vulnerability by navigating to File > Tools > Replace Text and pasting a payload of about 7000 bytes into the text fields, which causes the application to crash.
How can this vulnerability impact me? :
The primary impact of this vulnerability is a denial of service (DoS) condition. By exploiting the buffer overflow, an attacker can cause the Easyboot application to crash, disrupting normal operations.
What immediate steps should I take to mitigate this vulnerability?
To mitigate this vulnerability, avoid using the Replace Text function with oversized strings in Easyboot 6.6.0.
Restrict local access to the application to trusted users only to prevent exploitation.
Monitor for application updates or patches from the vendor that address this buffer overflow vulnerability and apply them as soon as they become available.