DEBIAN-CVE-2018-25224

Source
https://security-tracker.debian.org/tracker/CVE-2018-25224
Import Source
https://storage.googleapis.com/debian-osv/debian-cve-osv/DEBIAN-CVE-2018-25224.json
JSON Data
https://api.osv.dev/v1/vulns/DEBIAN-CVE-2018-25224
Upstream
  • CVE-2018-25224
Published
2026-03-28T12:16:03.370Z
Modified
2026-03-29T10:00:44.093730Z
Severity
  • 8.4 (High) CVSS_V3 - CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H CVSS Calculator
Summary
[none]
Details

PMS 0.42 contains a stack-based buffer overflow vulnerability that allows local unauthenticated attackers to execute arbitrary code by supplying malicious values in the configuration file. Attackers can craft configuration files with oversized input that overflows the stack buffer and execute shell commands via return-oriented programming gadgets.

References

Affected packages

Debian:11 / pms

Package

Name
pms
Purl
pkg:deb/debian/pms?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

0.*
0.42-1
0.42-1.1
0.42-2

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Database specific

source
"https://storage.googleapis.com/debian-osv/debian-cve-osv/DEBIAN-CVE-2018-25224.json"

Debian:13 / pms

Package

Name
pms
Purl
pkg:deb/debian/pms?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

0.*
0.42-1.1
0.42-2

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Database specific

source
"https://storage.googleapis.com/debian-osv/debian-cve-osv/DEBIAN-CVE-2018-25224.json"

Debian:14 / pms

Package

Name
pms
Purl
pkg:deb/debian/pms?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

0.*
0.42-1.1
0.42-2

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Database specific

source
"https://storage.googleapis.com/debian-osv/debian-cve-osv/DEBIAN-CVE-2018-25224.json"