CVE-2019-25365
Published: 18 February 2026
Description
ChaosPro 2.0 contains a buffer overflow vulnerability in the configuration file path handling that allows attackers to execute arbitrary code by overwriting the Structured Exception Handler. Attackers can craft a malicious configuration file with carefully constructed payload to overwrite memory…
more
and gain remote code execution on vulnerable Windows XP systems.
Mitigating Controls (NIST 800-53 r5)AI
SI-10 mandates validation of configuration file path inputs to directly prevent buffer overflows from maliciously crafted payloads.
SI-16 enforces memory protections that mitigate SEH overwrite exploits triggered by the buffer overflow vulnerability.
SI-2 requires timely flaw remediation to patch the specific buffer overflow in ChaosPro's configuration file path handling.
Security SummaryAI
CVE-2019-25365 is a buffer overflow vulnerability (CWE-121) in the configuration file path handling of ChaosPro 2.0, a fractal visualization software. The flaw enables attackers to overwrite the Structured Exception Handler (SEH) through a specially crafted malicious configuration file, leading to arbitrary code execution. It affects vulnerable installations of ChaosPro 2.0 running on Windows XP systems.
Remote attackers require no privileges, authentication, or user interaction to exploit this vulnerability over the network, as indicated by its CVSS v3.1 base score of 9.8 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H). By delivering a carefully constructed payload in the configuration file, attackers can overwrite memory and achieve remote code execution on the target system.
Advisories and related resources include the ChaosPro vendor website at http://www.chaospro.de/, a proof-of-concept exploit documented at https://www.exploit-db.com/exploits/47551, and a detailed advisory from VulnCheck at https://www.vulncheck.com/advisories/chaospro-buffer-overflow. No specific patches or mitigations are detailed in the available information.
A public proof-of-concept exploit exists, highlighting the risk for any remaining Windows XP deployments, an end-of-life operating system.
Details
- CWE(s)
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
The buffer overflow vulnerability in ChaosPro client software enables arbitrary code execution via SEH overwrite from a remote network vector without user interaction, directly facilitating T1203 Exploitation for Client Execution.