Bochs 2.6-5 contains a stack-based buffer overflow vulnerability that allows attackers to execute arbitrary code by supplying an oversized input string to the application. Attackers can craft a malicious payload with 1200 bytes of padding followed by a return-oriented programming chain to overwrite the instruction pointer and execute shell commands with application privileges.

Project Subscriptions

Vendors Products
Bochs Project Subscribe
Advisories

No advisories yet.

Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

Mon, 30 Mar 2026 15:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'poc', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Mon, 30 Mar 2026 07:15:00 +0000

Type Values Removed Values Added
First Time appeared Bochs
Bochs bochs
Vendors & Products Bochs
Bochs bochs

Sat, 28 Mar 2026 12:15:00 +0000

Type Values Removed Values Added
Description Bochs 2.6-5 contains a stack-based buffer overflow vulnerability that allows attackers to execute arbitrary code by supplying an oversized input string to the application. Attackers can craft a malicious payload with 1200 bytes of padding followed by a return-oriented programming chain to overwrite the instruction pointer and execute shell commands with application privileges.
Title Bochs 2.6-5 Buffer Overflow Remote Code Execution
First Time appeared Bochs Project
Bochs Project bochs
Weaknesses CWE-787
CPEs cpe:2.3:a:bochs_project:bochs:2.6-5:*:*:*:*:*:*:*
Vendors & Products Bochs Project
Bochs Project bochs
References
Metrics cvssV3_1

{'score': 9.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}

cvssV4_0

{'score': 9.3, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N'}


Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: VulnCheck

Published:

Updated: 2026-03-30T14:53:23.576Z

Reserved: 2026-03-28T11:46:46.215Z

Link: CVE-2018-25220

cve-icon Vulnrichment

Updated: 2026-03-30T12:50:53.466Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2026-03-28T12:16:02.600

Modified: 2026-03-30T13:26:07.647

Link: CVE-2018-25220

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-03-30T06:59:11Z

Weaknesses