Home

Description

SQL Server Password Changer 1.90 contains a buffer overflow vulnerability that allows local attackers to crash the application by supplying an oversized payload. Attackers can inject 6000 bytes of data into the User Name and Registration Code field to trigger a denial of service condition.

PUBLISHED Reserved 2026-02-23 | Published 2026-03-11 | Updated 2026-03-11 | Assigner VulnCheck




MEDIUM: 6.9CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
MEDIUM: 6.2CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

Problem types

Out-of-bounds Write

Product status

1.90
affected

Credits

Velayutham Selvaraj & Praveen Thiyagarayam (TwinTech Solutions) finder

References

www.exploit-db.com/exploits/47318 (ExploitDB-47318) exploit

www.vulncheck.com/...anger-denial-of-service-buffer-overflow (VulnCheck Advisory: SQL Server Password Changer 1.90 Denial of Service Buffer Overflow) third-party-advisory

cve.org (CVE-2019-25475)

nvd.nist.gov (CVE-2019-25475)

Download JSON