Description
iSelect 1.4.0-2+b1 contains a local buffer overflow vulnerability that allows local attackers to execute arbitrary code by supplying an oversized value to the -k/--key parameter. Attackers can craft a malicious argument containing a NOP sled, shellcode, and return address to overflow a 1024-byte stack buffer and gain code execution with user privileges.
Published: 2026-03-28
Score: 8.6 High
EPSS: < 1% Very Low
KEV: No
Impact: Arbitrary Code Execution
Action: Patch Immediately
AI Analysis

Impact

The vulnerability is a local buffer overflow triggered when calling iSelect with an oversized value for the –k or --key option. The overflow occurs in a 1024‑byte stack buffer and an attacker can supply a crafted argument containing a NOP sled, shellcode, and a return address, allowing them to execute arbitrary code with the privileges of the user running iSelect. The flaw is documented as a stack‑based buffer overflow.

Affected Systems

The affected product is iSelect from the iselect vendor, specifically version 1.4.0‑2+b1.

Risk and Exploitability

With a CVSS score of 8.6, the vulnerability is considered high severity. The EPSS score is not available and the issue is not listed in the CISA KEV catalog, indicating that the exploit is not widely known or actively used in the wild. However, the local nature of the attack means any user with access to the target machine can potentially trigger the overflow and gain code execution. System administrators should treat this as a high risk and prioritize remediation.

Generated by OpenCVE AI on March 28, 2026 at 13:24 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade iSelect to a version that addresses the buffer overflow.
  • If an upgrade is not immediately possible, restrict the use of the –k/--key option or remove the command from privileged access paths.
  • Monitor for abnormal execution attempts or signs of exploitation on affected systems.
  • Verify that the local user executing iSelect runs with the least privilege required for its function.

Generated by OpenCVE AI on March 28, 2026 at 13:24 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Mon, 30 Mar 2026 15:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Mon, 30 Mar 2026 07:15:00 +0000

Type Values Removed Values Added
First Time appeared Iselect
Iselect iselect
Vendors & Products Iselect
Iselect iselect

Sat, 28 Mar 2026 12:15:00 +0000

Type Values Removed Values Added
Description iSelect 1.4.0-2+b1 contains a local buffer overflow vulnerability that allows local attackers to execute arbitrary code by supplying an oversized value to the -k/--key parameter. Attackers can craft a malicious argument containing a NOP sled, shellcode, and return address to overflow a 1024-byte stack buffer and gain code execution with user privileges.
Title iSelect 1.4.0-2+b1 Local Buffer Overflow via key parameter
Weaknesses CWE-22
References
Metrics cvssV3_1

{'score': 8.4, 'vector': 'CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}

cvssV4_0

{'score': 8.6, 'vector': 'CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: VulnCheck

Published:

Updated: 2026-03-30T14:21:39.496Z

Reserved: 2026-03-28T11:41:04.200Z

Link: CVE-2016-20048

cve-icon Vulnrichment

Updated: 2026-03-30T14:21:29.551Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2026-03-28T12:16:01.210

Modified: 2026-03-30T13:26:07.647

Link: CVE-2016-20048

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-03-30T06:59:17Z

Weaknesses