CVE-2019-25667
Local Buffer Overflow in TaskInfo 8.2.0 Causes DoS
Publication date: 2026-04-05
Last updated on: 2026-04-20
Assigner: VulnCheck
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| iarsn | taskinfo | to 8.2.0.280 (inc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-787 | The product writes data past the end, or before the beginning, of the intended buffer. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability exists in TaskInfo version 8.2.0.280 and is a local buffer overflow issue. It occurs when an attacker inputs an excessively long string into the New User Name or New Serial Number fields within the registration dialog of the Help menu. This oversized input causes the application to crash.
Essentially, the program does not properly handle very large inputs in these fields, leading to a buffer overflow that results in a denial of service condition.
How can this vulnerability impact me? :
The primary impact of this vulnerability is that an attacker can cause the TaskInfo application to crash by providing oversized input in specific registration fields. This leads to a denial of service (DoS) condition, making the application unavailable to legitimate users.