CVE-2019-25327
Prime95 · Prime95
Prime95 version 29.8 build 6 contains a buffer overflow in the user ID and proxy host fields, allowing remote attackers to execute arbitrary code and establish a bind shell.
Executive summary
A critical buffer overflow in Prime95 allows attackers to execute arbitrary code and gain remote access to systems by exploiting the user ID input fields.
Vulnerability
This stack-based buffer overflow is triggered when a malicious payload is pasted into the PrimeNet user ID or proxy host fields. Successful exploitation allows an attacker to execute arbitrary code and open a bind shell on port 3110.
Business impact
A CVSS score of 9.8 indicates a critical risk. If Prime95 is used on corporate systems (e.g., for stress testing), an attacker could gain a persistent foothold on the network, enabling further exploitation, data theft, and potential ransomware deployment.
Remediation
Immediate Action: Update Prime95 to the latest version or uninstall version 29.8 build 6 immediately.
Proactive Monitoring: Monitor network traffic for unauthorized connections on port 3110 and scan endpoints for the presence of vulnerable Prime95 installations.
Compensating Controls: Use host-based intrusion prevention systems (HIPS) to detect and block buffer overflow attempts and restrict the use of stress-testing software to isolated, non-production environments.
Exploitation status
Public Exploit Available: false
Analyst recommendation
Organizations should strictly control the use of third-party utility software like Prime95. Ensure that all such tools are kept up to date and are only utilized by authorized personnel within controlled environments to minimize the risk of remote code execution.