CVE-2019-25330
📋 TL;DR
SurfOffline Professional 2.2.0.103 contains a structured exception handler overflow vulnerability in project name input. Attackers can crash the application via denial of service by sending a malicious payload. Users of this specific software version are affected.
💻 Affected Systems
- SurfOffline Professional
⚠️ Manual Verification Required
This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.
Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).
🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.
- Review the CVE details at NVD
- Check vendor security advisories for your specific version
- Test if the vulnerability is exploitable in your environment
- Consider updating to the latest version as a precaution
⚠️ Risk & Real-World Impact
Worst Case
Complete application crash and denial of service, potentially allowing arbitrary code execution if combined with other vulnerabilities
Likely Case
Application crash and denial of service, disrupting legitimate users' ability to use the software
If Mitigated
No impact if software is patched or not in use
🎯 Exploit Status
Exploit code is publicly available on Exploit-DB; requires local access or file manipulation
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Unknown
Vendor Advisory: https://web.archive.org/web/20190717003929/http://www.bimesoft.com/
Restart Required: No
Instructions:
No official patch available. Consider upgrading to newer version if available or discontinuing use.
🔧 Temporary Workarounds
Input Validation
windowsImplement strict input validation for project name field to prevent buffer overflow
Application Sandboxing
windowsRun SurfOffline in restricted user context or sandbox to limit impact
🧯 If You Can't Patch
- Discontinue use of SurfOffline Professional 2.2.0.103
- Implement network segmentation to limit access to systems running vulnerable software
🔍 How to Verify
Check if Vulnerable:
Check Help > About in SurfOffline to confirm version 2.2.0.103
Check Version:
Check application properties or Help > About menu
Verify Fix Applied:
Verify software is no longer version 2.2.0.103 or has been removed
📡 Detection & Monitoring
Log Indicators:
- Application crash logs with exception code 0xC0000005 (ACCESS_VIOLATION)
- Unexpected termination of surfoffline.exe
Network Indicators:
- No network indicators - local exploitation only
SIEM Query:
EventID=1000 OR EventID=1001 AND ProcessName="surfoffline.exe"