Home

Description

Prime95 29.4b7 contains a buffer overflow vulnerability in the PrimeNet connection dialog that allows local attackers to crash the application by supplying an excessively long string in the optional proxy password field. Attackers can trigger a denial of service by entering a 6000-byte payload into the proxy password parameter, causing the application to crash when processing the connection settings.

PUBLISHED Reserved 2026-04-26 | Published 2026-04-26 | Updated 2026-04-27 | Assigner VulnCheck




MEDIUM: 6.9CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
MEDIUM: 6.2CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

Problem types

Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')

Product status

29.4b7
affected

Credits

Gionathan "John" Reale finder

References

www.exploit-db.com/exploits/45226 (ExploitDB-45226) exploit

www.mersenne.org (Official Product Homepage) product

www.mersenne.org/ftp_root/gimps/p95v294b7.win32.zip (Product Reference) product

www.vulncheck.com/...ial-of-service-via-proxy-password-field (VulnCheck Advisory: Prime95 29.4b7 Denial of Service via Proxy Password Field) third-party-advisory

cve.org (CVE-2018-25293)

nvd.nist.gov (CVE-2018-25293)

Download JSON