Home

Description

Atomic Alarm Clock 6.3 contains a stack overflow vulnerability that allows local attackers to execute arbitrary code by supplying a malicious string to the display name textbox in the Time Zones Clock configuration. Attackers can craft a buffer with structured exception handling overwrite and encoded shellcode to bypass SafeSEH protections and execute arbitrary commands with application privileges.

PUBLISHED Reserved 2026-05-13 | Published 2026-05-13 | Updated 2026-05-13 | Assigner VulnCheck




HIGH: 8.6CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
HIGH: 8.4CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Problem types

Stack-based Buffer Overflow

Product status

6.3
affected

Credits

Bobby Cooke finder

References

www.exploit-db.com/exploits/48346 (ExploitDB-48346) exploit

www.vulncheck.com/...rm-clock-stack-overflow-via-seh-unicode (VulnCheck Advisory: Atomic Alarm Clock 6.3 Stack Overflow via SEH Unicode) third-party-advisory

cve.org (CVE-2020-37221)

nvd.nist.gov (CVE-2020-37221)

Download JSON