Vulnerability Description
PassFab RAR Password Recovery 9.3.2 contains a structured exception handler (SEH) buffer overflow vulnerability that allows local attackers to execute arbitrary code by supplying a malicious payload. Attackers can craft a payload with a buffer overflow, NSEH jump, and shellcode, then paste it into the 'Licensed E-mail and Registration Code' field during registration to trigger code execution.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Passfab | Rar Password Recovery | <= 9.3.2 |
Related Weaknesses (CWE)
References
- https://www.exploit-db.com/exploits/46008ExploitVDB Entry
- https://www.passfab.com/downloads/passfab-rar-password-recovery.exeProduct
- https://www.passfab.com/products/rar-password-recovery.htmlProduct
- https://www.vulncheck.com/advisories/passfab-rar-password-recovery-seh-buffer-ovThird Party Advisory
FAQ
What is CVE-2018-25218?
CVE-2018-25218 is a vulnerability with a CVSS score of 8.4 (HIGH). PassFab RAR Password Recovery 9.3.2 contains a structured exception handler (SEH) buffer overflow vulnerability that allows local attackers to execute arbitrary code by supplying a malicious payload. ...
How severe is CVE-2018-25218?
CVE-2018-25218 has been rated HIGH with a CVSS base score of 8.4/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2018-25218?
Check the references section above for vendor advisories and patch information. Affected products include: Passfab Rar Password Recovery.