CVE-2018-25224 PUBLISHED

PMS 0.42 Stack-Based Buffer Overflow via Configuration File

Assigner: VulnCheck
Reserved: 28.03.2026 Published: 28.03.2026 Updated: 28.03.2026

PMS 0.42 contains a stack-based buffer overflow vulnerability that allows local unauthenticated attackers to execute arbitrary code by supplying malicious values in the configuration file. Attackers can craft configuration files with oversized input that overflows the stack buffer and execute shell commands via return-oriented programming gadgets.

Metrics

CVSS Vector: CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
CVSS Score: 8.6

Product Status

Vendor pms
Product PMS
Versions
  • Version 0.42 is affected

Credits

  • Juan Sacco <jsacco@exploitpack.com> - http://exploitpack.com finder

References

Problem Types

  • Missing Authentication for Critical Function CWE