CVE-2019-7165
📋 TL;DR
CVE-2019-7165 is a critical buffer overflow vulnerability in DOSBox 0.74-2 that allows attackers to execute arbitrary code on affected systems. This affects anyone running vulnerable versions of DOSBox, particularly users who run untrusted DOS applications or games. The vulnerability stems from improper bounds checking when processing certain inputs.
💻 Affected Systems
- DOSBox
📦 What is this software?
Dosbox by Dosbox
Fedora by Fedoraproject
Fedora by Fedoraproject
⚠️ Risk & Real-World Impact
Worst Case
Complete system compromise with remote code execution, potentially leading to full control of the host system where DOSBox is running.
Likely Case
Local privilege escalation or arbitrary code execution when processing malicious DOS applications or specially crafted inputs.
If Mitigated
Limited impact if running DOSBox in isolated environments or with restricted privileges.
🎯 Exploit Status
Buffer overflow vulnerabilities in emulators are often easily weaponized for code execution.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: 0.74-3 and later
Vendor Advisory: https://www.dosbox.com/
Restart Required: Yes
Instructions:
1. Download latest DOSBox version from official website. 2. Uninstall vulnerable version. 3. Install patched version. 4. Restart system.
🔧 Temporary Workarounds
Run with reduced privileges
allRun DOSBox with non-administrative privileges to limit potential damage
Use container isolation
allRun DOSBox in a container or virtual machine to isolate from host system
🧯 If You Can't Patch
- Discontinue use of DOSBox until patched version can be installed
- Only run trusted DOS applications from verified sources
🔍 How to Verify
Check if Vulnerable:
Check DOSBox version: On Linux: dosbox --version | grep '0.74-2'. On Windows: Check program properties or About dialog.
Check Version:
dosbox --version
Verify Fix Applied:
Verify version is 0.74-3 or higher: dosbox --version
📡 Detection & Monitoring
Log Indicators:
- Crash logs from DOSBox
- Unexpected process termination
- Memory access violation errors
Network Indicators:
- Not applicable - local vulnerability
SIEM Query:
Process:dosbox.exe AND (EventID:1000 OR EventID:1001) OR Application Error in Windows Event Logs
🔗 References
- http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00047.html
- http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00053.html
- https://lists.debian.org/debian-lts-announce/2019/07/msg00004.html
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PYV27Z3QZTDHUZJLW3LDJYO7HBVIMJ5F/
- https://seclists.org/bugtraq/2019/Jul/14
- https://security-tracker.debian.org/tracker/CVE-2019-7165
- https://www.debian.org/security/2019/dsa-4478
- https://www.dosbox.com
- http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00047.html
- http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00053.html
- https://lists.debian.org/debian-lts-announce/2019/07/msg00004.html
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PYV27Z3QZTDHUZJLW3LDJYO7HBVIMJ5F/
- https://seclists.org/bugtraq/2019/Jul/14
- https://security-tracker.debian.org/tracker/CVE-2019-7165
- https://www.debian.org/security/2019/dsa-4478
- https://www.dosbox.com