Nixpkgs security tracker

Login with GitHub
⚠️ You are using a production deployment that is still only suitable for demo purposes. Any work done in this might be wiped later without notice.

Suggestions search

With package: bochs

Found 1 matching suggestions

View:
Compact
Detailed
Untriaged
Permalink CVE-2018-25220
9.8 CRITICAL
  • CVSS version: 3.1
  • Attack vector (AV): NETWORK
  • Attack complexity (AC): LOW
  • Privileges required (PR): NONE
  • User interaction (UI): NONE
  • Scope (S): UNCHANGED
  • Confidentiality impact (C): HIGH
  • Integrity impact (I): HIGH
  • Availability impact (A): HIGH
created 3 weeks ago
Bochs 2.6-5 Buffer Overflow Remote Code Execution

Bochs 2.6-5 contains a stack-based buffer overflow vulnerability that allows attackers to execute arbitrary code by supplying an oversized input string to the application. Attackers can craft a malicious payload with 1200 bytes of padding followed by a return-oriented programming chain to overwrite the instruction pointer and execute shell commands with application privileges.

Affected products

BOCHS
  • ==2.6-5

Matching in nixpkgs

pkgs.bochs

Open-source IA-32 (x86) PC emulator

  • nixos-unstable 3.0
    • nixpkgs-unstable 3.0
    • nixos-unstable-small 3.0
  • nixos-25.11 3.0
    • nixos-25.11-small 3.0
    • nixpkgs-25.11-darwin 3.0