Description
Bochs 2.6-5 contains a stack-based buffer overflow vulnerability that allows attackers to execute arbitrary code by supplying an oversized input string to the application. Attackers can craft a malicious payload with 1200 bytes of padding followed by a return-oriented programming chain to overwrite the instruction pointer and execute shell commands with application privileges.
Published: 2026-03-28
Score: 9.3 Critical
EPSS: < 1% Very Low
KEV: No
Impact: Remote Code Execution
Action: Immediate Patch
AI Analysis

Impact

The vulnerability is a stack‑based buffer overflow in the Bochs 2.6‑5 emulator. An attacker can supply an oversized input string, 1200 bytes of padding followed by a return‑oriented‑programming chain, that overwrites the instruction pointer and causes arbitrary shell commands to execute with the privileges of the running Bochs process. This provides the attacker with the ability to read, modify, or delete files and execute any program under the emulator’s user account. The weakness is a classic buffer overflow and is classified as CWE‑787.

Affected Systems

Affected systems are the Bochs emulator distributed by the Bochs Project. The vulnerability exists in version 2.6‑5 (also listed as 2.6.5). No other product versions are listed as affected. Applications that run this version of Bochs are at risk if they accept user‑supplied input without proper bounds checking.

Risk and Exploitability

The CVSS score of 9.3 marks this issue as critical. However, the EPSS score of less than 1% indicates a very low likelihood of current exploitation in the wild, and the vulnerability is not included in CISA’s KEV catalog. The attack vector is inferred to be remote or local depending on how the emulator receives input; if the Bochs process is exposed to network traffic or processes untrusted files, an attacker could deliver the malicious payload. The exploit requires only the ability to supply a crafted string to Bochs, making it potentially exploitable in environments where the emulator is run with elevated privileges.

Generated by OpenCVE AI on April 2, 2026 at 21:21 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade Bochs to a version newer than 2.6‑5 that contains the buffer overflow fix
  • If a timely upgrade is not possible, restrict Bochs from receiving untrusted input, for example by disabling network or file readers that provide data to the emulator
  • Monitor logs for abnormal input lengths or crashes that could indicate an attempted buffer overflow

Generated by OpenCVE AI on April 2, 2026 at 21:21 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Thu, 02 Apr 2026 20:30:00 +0000

Type Values Removed Values Added
CPEs cpe:2.3:a:bochs_project:bochs:2.6.5:*:*:*:*:*:*:*

Mon, 30 Mar 2026 15:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'poc', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Mon, 30 Mar 2026 07:15:00 +0000

Type Values Removed Values Added
First Time appeared Bochs
Bochs bochs
Vendors & Products Bochs
Bochs bochs

Sat, 28 Mar 2026 12:15:00 +0000

Type Values Removed Values Added
Description Bochs 2.6-5 contains a stack-based buffer overflow vulnerability that allows attackers to execute arbitrary code by supplying an oversized input string to the application. Attackers can craft a malicious payload with 1200 bytes of padding followed by a return-oriented programming chain to overwrite the instruction pointer and execute shell commands with application privileges.
Title Bochs 2.6-5 Buffer Overflow Remote Code Execution
First Time appeared Bochs Project
Bochs Project bochs
Weaknesses CWE-787
CPEs cpe:2.3:a:bochs_project:bochs:2.6-5:*:*:*:*:*:*:*
Vendors & Products Bochs Project
Bochs Project bochs
References
Metrics cvssV3_1

{'score': 9.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}

cvssV4_0

{'score': 9.3, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: VulnCheck

Published:

Updated: 2026-03-30T14:53:23.576Z

Reserved: 2026-03-28T11:46:46.215Z

Link: CVE-2018-25220

cve-icon Vulnrichment

Updated: 2026-03-30T12:50:53.466Z

cve-icon NVD

Status : Analyzed

Published: 2026-03-28T12:16:02.600

Modified: 2026-04-02T19:18:20.330

Link: CVE-2018-25220

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-03T09:38:32Z

Weaknesses