CVE-2019-25667
Received Received - Intake
Local Buffer Overflow in TaskInfo 8.2.0 Causes DoS

Publication date: 2026-04-05

Last updated on: 2026-04-20

Assigner: VulnCheck

Description
TaskInfo 8.2.0.280 contains a local buffer overflow vulnerability that allows attackers to crash the application by supplying oversized input to registration fields. Attackers can paste excessively long strings into the New User Name or New Serial Number textboxes in the Help menu's registration dialog to trigger a denial of service condition.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2026-04-05
Last Modified
2026-04-20
Generated
2026-05-07
AI Q&A
2026-04-06
EPSS Evaluated
2026-05-05
NVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
iarsn taskinfo to 8.2.0.280 (inc)
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-787 The product writes data past the end, or before the beginning, of the intended buffer.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

This vulnerability exists in TaskInfo version 8.2.0.280 and is a local buffer overflow issue. It occurs when an attacker inputs an excessively long string into the New User Name or New Serial Number fields within the registration dialog of the Help menu. This oversized input causes the application to crash.

Essentially, the program does not properly handle very large inputs in these fields, leading to a buffer overflow that results in a denial of service condition.


How can this vulnerability impact me? :

The primary impact of this vulnerability is that an attacker can cause the TaskInfo application to crash by providing oversized input in specific registration fields. This leads to a denial of service (DoS) condition, making the application unavailable to legitimate users.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart