CVE-2019-25319

9.8 CRITICAL

📋 TL;DR

CVE-2019-25319 is a critical stack overflow vulnerability in Domain Quester Pro 6.02 that allows remote attackers to execute arbitrary code by exploiting Structured Exception Handler (SEH) overwrite. Attackers can send a malicious payload through the 'Domain Name Keywords' input field to trigger the vulnerability and potentially execute a bind shell on port 9999. This affects all users running the vulnerable version of Domain Quester Pro.

💻 Affected Systems

Products:
  • Domain Quester Pro
Versions: 6.02
Operating Systems: Windows
Default Config Vulnerable: ⚠️ Yes
Notes: The vulnerability is in the 'Domain Name Keywords' input field functionality. No special configuration required for exploitation.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Remote code execution with SYSTEM/administrator privileges leading to complete system compromise, data theft, ransomware deployment, and persistent backdoor installation.

🟠

Likely Case

Remote attacker gains shell access on the vulnerable system, enabling data exfiltration, lateral movement, and installation of additional malware.

🟢

If Mitigated

Attack fails due to proper input validation, DEP/ASLR protection, or network segmentation preventing exploitation.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: CONFIRMED
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploit code is publicly available on Exploit-DB (ID 47825) and demonstrates reliable exploitation with bind shell payload.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Unknown

Vendor Advisory: http://www.internet-soft.com/

Restart Required: No

Instructions:

1. Check vendor website for updated version
2. Uninstall vulnerable version 6.02
3. Install latest version if available
4. If no patch exists, implement workarounds or discontinue use

🔧 Temporary Workarounds

Network Segmentation

all

Isolate Domain Quester Pro systems from untrusted networks and internet access

Input Validation

all

Implement application-level input validation for Domain Name Keywords field

🧯 If You Can't Patch

  • Disable or uninstall Domain Quester Pro 6.02 completely
  • Implement strict network firewall rules to block inbound connections to port 9999 and restrict outbound connections

🔍 How to Verify

Check if Vulnerable:

Check installed version of Domain Quester Pro. If version is 6.02, the system is vulnerable.

Check Version:

Check program properties or About dialog in Domain Quester Pro interface

Verify Fix Applied:

Verify Domain Quester Pro is either uninstalled or updated to a version later than 6.02

📡 Detection & Monitoring

Log Indicators:

  • Unusual process creation from Domain Quester Pro
  • Access violation errors in application logs
  • Bind shell activity on port 9999

Network Indicators:

  • Outbound connections from Domain Quester Pro to suspicious IPs
  • Inbound connections to port 9999
  • Unusual network traffic patterns

SIEM Query:

source="Domain Quester Pro" AND (event_type="access_violation" OR dest_port=9999)

🔗 References

📤 Share & Export