Bochs 2.6-5 contains a stack-based buffer overflow vulnerability that allows attackers to execute arbitrary code by supplying an oversized input string to the application. Attackers can craft a malicious payload with 1200 bytes of padding followed by a return-oriented programming chain to overwrite the instruction pointer and execute shell commands with application privileges.

Project Subscriptions

Vendors Products
Bochs Project Subscribe
Advisories

No advisories yet.

Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

Sat, 28 Mar 2026 12:15:00 +0000

Type Values Removed Values Added
Description Bochs 2.6-5 contains a stack-based buffer overflow vulnerability that allows attackers to execute arbitrary code by supplying an oversized input string to the application. Attackers can craft a malicious payload with 1200 bytes of padding followed by a return-oriented programming chain to overwrite the instruction pointer and execute shell commands with application privileges.
Title Bochs 2.6-5 Buffer Overflow Remote Code Execution
First Time appeared Bochs Project
Bochs Project bochs
Weaknesses CWE-787
CPEs cpe:2.3:a:bochs_project:bochs:2.6-5:*:*:*:*:*:*:*
Vendors & Products Bochs Project
Bochs Project bochs
References
Metrics cvssV3_1

{'score': 9.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}

cvssV4_0

{'score': 9.3, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N'}


Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: VulnCheck

Published:

Updated: 2026-03-28T11:58:13.268Z

Reserved: 2026-03-28T11:46:46.215Z

Link: CVE-2018-25220

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Received

Published: 2026-03-28T12:16:02.600

Modified: 2026-03-28T12:16:02.600

Link: CVE-2018-25220

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses