Vulnerability Description
Terminal Services Manager 3.1 contains a stack-based buffer overflow vulnerability in the computer names field that allows local attackers to execute arbitrary code by triggering structured exception handling. Attackers can craft a malicious input file with shellcode and jump instructions that overwrite the SEH handler pointer to execute calc.exe or other payloads when imported through the add computers wizard.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Lizardsystems | Terminal Services Manager | <= 3.1 |
Related Weaknesses (CWE)
References
- https://lizardsystems.comProduct
- https://www.exploit-db.com/exploits/46058ExploitVDB Entry
- https://www.vulncheck.com/advisories/terminal-services-manager-buffer-overflow-sThird Party Advisory
FAQ
What is CVE-2018-25259?
CVE-2018-25259 is a vulnerability with a CVSS score of 8.4 (HIGH). Terminal Services Manager 3.1 contains a stack-based buffer overflow vulnerability in the computer names field that allows local attackers to execute arbitrary code by triggering structured exception ...
How severe is CVE-2018-25259?
CVE-2018-25259 has been rated HIGH with a CVSS base score of 8.4/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2018-25259?
Check the references section above for vendor advisories and patch information. Affected products include: Lizardsystems Terminal Services Manager.