CVE-2018-25292
Buffer Overflow in Bome Restorator 1793 Causes DoS
Publication date: 2026-04-26
Last updated on: 2026-04-26
Assigner: VulnCheck
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| bome | restorator | 1793 |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-120 | The product copies an input buffer to an output buffer without verifying that the size of the input buffer is less than the size of the output buffer. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
Bome Restorator 1793 contains a buffer overflow vulnerability that can be triggered by local attackers. This happens when an attacker supplies an excessively long string in the Name field of the application.
By creating a malicious payload exceeding 4000 bytes and pasting it into the Name input field, the attacker can cause the application to crash.
This vulnerability leads to a denial of service condition by crashing the application.
How can this vulnerability impact me? :
This vulnerability can impact you by allowing a local attacker to crash the Bome Restorator application.
The crash results in a denial of service, meaning the application becomes unavailable or unusable until it is restarted or fixed.
How can this vulnerability be detected on my network or system? Can you suggest some commands?
This vulnerability involves a buffer overflow triggered by supplying an excessively long string in the Name field of Bome Restorator 1793. Detection would involve monitoring for application crashes or denial of service events caused by unusually long input strings.
Since the vulnerability is local and triggered by input to the application, network detection is limited. On the system, you can check for application crashes or logs indicating failure when processing long Name field inputs.
No specific commands or detection tools are provided in the available information.
What immediate steps should I take to mitigate this vulnerability?
Immediate mitigation involves preventing local attackers from supplying excessively long strings in the Name field to Bome Restorator 1793.
Restrict local user access to the application to trusted users only.
Monitor and limit input lengths where possible to avoid triggering the buffer overflow.
No specific patches or updates are mentioned in the provided information.