Description
PMS 0.42 contains a stack-based buffer overflow vulnerability that allows local unauthenticated attackers to execute arbitrary code by supplying malicious values in the configuration file. Attackers can craft configuration files with oversized input that overflows the stack buffer and execute shell commands via return-oriented programming gadgets.
Published: 2026-03-28
Score: 8.6 High
EPSS: < 1% Very Low
KEV: No
Impact: Local arbitrary code execution via malicious configuration files
Action: Immediate Patch
AI Analysis

Impact

Practical Music Search version 0.42 has a stack‑based buffer overflow that can be triggered when a local, unauthenticated attacker supplies an oversized value in the configuration file. The overflow corrupts the stack and permits execution of arbitrary code using return‑oriented programming gadgets, giving the attacker full control of the process and potentially the host system.

Affected Systems

The vulnerability affects the Practical Music Search software, specifically the 0.42 release. No other versions are identified as vulnerable in the available data.

Risk and Exploitability

The CVSS score of 8.6 indicates high severity while the EPSS score of less than 1% suggests that exploitation is currently unlikely. The vulnerability is not listed in CISA’s KEV catalog. Based on the description, the attack vector is local file manipulation: an attacker must be able to create or modify the PMS configuration file, which typically requires write access to the filesystem. If such access is present, the attacker can trigger the overflow and achieve arbitrary code execution without authentication.

Generated by OpenCVE AI on April 2, 2026 at 22:44 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Apply any available vendor patch that fixes CVE‑2018‑25224 on the Practical Music Search website.
  • If a patch is not yet released, restrict write permissions to the PMS configuration file so that only trusted administrators can modify it.
  • Monitor system logs for unexpected activity involving PMS, such as new process creation or shell invocation.
  • Consider relocating the configuration directory to a protected area and disabling any automatic loading of configuration changes from untrusted sources.

Generated by OpenCVE AI on April 2, 2026 at 22:44 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Thu, 02 Apr 2026 20:30:00 +0000

Type Values Removed Values Added
First Time appeared Kimtore
Kimtore practical Music Search
CPEs cpe:2.3:a:kimtore:practical_music_search:*:*:*:*:*:*:*:*
Vendors & Products Kimtore
Kimtore practical Music Search

Mon, 30 Mar 2026 18:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Mon, 30 Mar 2026 07:15:00 +0000

Type Values Removed Values Added
First Time appeared Pms
Pms pms
Vendors & Products Pms
Pms pms

Sat, 28 Mar 2026 12:15:00 +0000

Type Values Removed Values Added
Description PMS 0.42 contains a stack-based buffer overflow vulnerability that allows local unauthenticated attackers to execute arbitrary code by supplying malicious values in the configuration file. Attackers can craft configuration files with oversized input that overflows the stack buffer and execute shell commands via return-oriented programming gadgets.
Title PMS 0.42 Stack-Based Buffer Overflow via Configuration File
Weaknesses CWE-306
References
Metrics cvssV3_1

{'score': 8.4, 'vector': 'CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}

cvssV4_0

{'score': 8.6, 'vector': 'CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N'}


Subscriptions

Kimtore Practical Music Search
Pms Pms
cve-icon MITRE

Status: PUBLISHED

Assigner: VulnCheck

Published:

Updated: 2026-03-30T17:25:30.861Z

Reserved: 2026-03-28T11:49:40.863Z

Link: CVE-2018-25224

cve-icon Vulnrichment

Updated: 2026-03-30T17:25:24.681Z

cve-icon NVD

Status : Analyzed

Published: 2026-03-28T12:16:03.370

Modified: 2026-04-02T19:07:35.200

Link: CVE-2018-25224

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-03T09:38:29Z

Weaknesses