CVE-2018-25293
Buffer Overflow in Prime95 Proxy Password Causes DoS Crash
Publication date: 2026-04-26
Last updated on: 2026-04-26
Assigner: VulnCheck
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| prime95 | prime95 | 29.4b7 |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-120 | The product copies an input buffer to an output buffer without verifying that the size of the input buffer is less than the size of the output buffer. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability exists in Prime95 version 29.4b7 within the PrimeNet connection dialog. It is a buffer overflow issue caused by the application accepting an excessively long string in the optional proxy password field.
Local attackers can exploit this by entering a very long input (for example, a 6000-byte payload) into the proxy password parameter, which causes the application to crash when it processes the connection settings.
How can this vulnerability impact me? :
The primary impact of this vulnerability is a denial of service (DoS). An attacker with local access can cause the Prime95 application to crash by supplying an overly long proxy password string.
This crash disrupts normal operation, potentially causing loss of service or interruption in any processes relying on Prime95.