CVE-2018-25304
Buffer Overflow in Free Download Manager via Malicious URL Import
Publication date: 2026-04-29
Last updated on: 2026-04-29
Assigner: VulnCheck
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| freedownloadmanager | free_download_manager | 2.0_built_417 |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-120 | The product copies an input buffer to an output buffer without verifying that the size of the input buffer is less than the size of the output buffer. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
CVE-2018-25304 is a local buffer overflow vulnerability found in Free Download Manager version 2.0 Built 417, specifically in its URL import functionality.
Attackers can create a malicious URL file that, when imported through the File > Import > Import lists of downloads menu, causes a buffer overflow in the Location header response.
This overflow overwrites the structured exception handler (SEH) chain, which can be exploited to execute arbitrary code on the affected system.
Can you explain this vulnerability to me?
This vulnerability exists in Free Download Manager 2.0 Build 417 and involves a local buffer overflow in the URL import functionality.
Attackers can create a specially crafted malicious URL file that, when imported via the File > Import > Import lists of downloads menu, triggers a buffer overflow in the Location header response.
This overflow overwrites the structured exception handler (SEH) chain, allowing the attacker to execute arbitrary code on the affected system.
How can this vulnerability impact me? :
Exploitation of this vulnerability can lead to arbitrary code execution on the affected system.
This means an attacker could potentially run malicious code with the privileges of the user running Free Download Manager, leading to system compromise.
The vulnerability has a high severity score (CVSS v3.1 Base Score 8.4), indicating significant impact on confidentiality, integrity, and availability.
How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:
The provided information does not specify how this vulnerability affects compliance with common standards and regulations such as GDPR or HIPAA.
How can this vulnerability impact me? :
This vulnerability can have a significant impact as it allows attackers to execute arbitrary code on the affected system without user interaction or privileges.
The CVSS v4 score of 8.6 reflects a high severity, indicating that the vulnerability can compromise confidentiality, integrity, and availability of the system.
Successful exploitation could lead to unauthorized access, data manipulation, or disruption of services.
How can this vulnerability be detected on my network or system? Can you suggest some commands?
This vulnerability can be detected by identifying the presence of Free Download Manager version 2.0 Built 417 on the system and monitoring for the import of malicious URL files via the File > Import > Import lists of downloads menu.
Since the vulnerability is triggered by importing a crafted URL file that causes a buffer overflow in the Location header response, detection can involve checking for unusual or suspicious URL import activities or malformed URL files.
Specific commands are not provided in the available resources, but general detection steps could include:
- Checking the installed version of Free Download Manager to confirm if it is version 2.0 Built 417.
- Monitoring file import activities related to URL lists within the application.
- Using system or application logs to detect crashes or exceptions related to the SEH chain, which may indicate exploitation attempts.
What immediate steps should I take to mitigate this vulnerability?
Immediate mitigation steps include avoiding the import of untrusted or suspicious URL files through the File > Import > Import lists of downloads menu in Free Download Manager version 2.0 Built 417.
Since the vulnerability allows arbitrary code execution via a crafted URL file, restricting user access to import functionality or disabling it temporarily can reduce risk.
Additionally, updating to a patched or newer version of Free Download Manager, if available, is recommended to fully remediate the vulnerability.