Bochs 2.6-5 contains a stack-based buffer overflow vulnerability that allows attackers to execute arbitrary code by supplying an oversized input string to the application. Attackers can craft a malicious payload with 1200 bytes of padding followed by a return-oriented programming chain to overwrite the instruction pointer and execute shell commands with application privileges.
Advisories

No advisories yet.

Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

Thu, 02 Apr 2026 20:30:00 +0000

Type Values Removed Values Added
CPEs cpe:2.3:a:bochs_project:bochs:2.6.5:*:*:*:*:*:*:*

Mon, 30 Mar 2026 15:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'poc', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Mon, 30 Mar 2026 07:15:00 +0000

Type Values Removed Values Added
First Time appeared Bochs
Bochs bochs
Vendors & Products Bochs
Bochs bochs

Sat, 28 Mar 2026 12:15:00 +0000

Type Values Removed Values Added
Description Bochs 2.6-5 contains a stack-based buffer overflow vulnerability that allows attackers to execute arbitrary code by supplying an oversized input string to the application. Attackers can craft a malicious payload with 1200 bytes of padding followed by a return-oriented programming chain to overwrite the instruction pointer and execute shell commands with application privileges.
Title Bochs 2.6-5 Buffer Overflow Remote Code Execution
First Time appeared Bochs Project
Bochs Project bochs
Weaknesses CWE-787
CPEs cpe:2.3:a:bochs_project:bochs:2.6-5:*:*:*:*:*:*:*
Vendors & Products Bochs Project
Bochs Project bochs
References
Metrics cvssV3_1

{'score': 9.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}

cvssV4_0

{'score': 9.3, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N'}


Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: VulnCheck

Published:

Updated: 2026-03-30T14:53:23.576Z

Reserved: 2026-03-28T11:46:46.215Z

Link: CVE-2018-25220

cve-icon Vulnrichment

Updated: 2026-03-30T12:50:53.466Z

cve-icon NVD

Status : Analyzed

Published: 2026-03-28T12:16:02.600

Modified: 2026-04-02T19:18:20.330

Link: CVE-2018-25220

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-03T09:38:32Z

Weaknesses