HIGHVulnerability
Verified
Global

NVD HIGH: CVE-2018-25224 — PMS 0.42 contains a stack-based buffer overflow vulnerability that allows local ...

Saturday, March 28, 2026 at 12:16 PM UTC·Source: NIST NVD

Updated: Friday, April 3, 2026 at 02:38 AM UTC

Executive Summary

PMS 0.42 contains a stack-based buffer overflow vulnerability that allows local unauthenticated attackers to execute arbitrary code by supplying malicious values in the configuration file. Attackers can craft configuration files with oversized input that overflows the stack buffer and execute shell commands via return-oriented programming gadgets.

Analysis

PMS 0.42 contains a stack-based buffer overflow vulnerability that allows local unauthenticated attackers to execute arbitrary code by supplying malicious values in the configuration file. Attackers can craft configuration files with oversized input that overflows the stack buffer and execute shell commands via return-oriented programming gadgets. CVSS Score: 8.4. Published: 2026-03-28T12:16:03.370.

Indicators of Compromise (1)

CVE (1)
CVE-2018-25224
Source Attribution

Originally published by NIST NVD on Mar 28, 2026. Verified by: NIST.

Related Threats