Description
Prime95 29.4b8 contains a local buffer overflow vulnerability that allows attackers to execute arbitrary code by exploiting structured exception handling (SEH) mechanisms. Attackers can inject malicious payload through the optional proxy hostname field in the PrimeNet connection settings to trigger the overflow and execute system commands.
Published: 2026-04-29
Score: 8.6 High
EPSS: n/a
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

Prime95 29.4b8 holds a local buffer overflow vulnerability that enables attackers to execute arbitrary code by taking advantage of the structured exception handling (SEH) mechanism. The overflow can be triggered by supplying a malicious proxy hostname string in the PrimeNet connection settings. Successful exploitation permits the attacker to run any system command with the privileges of the user running Prime95, effectively compromising the host.

Affected Systems

The vulnerability affects the Prime95 calculation engine distributed by Mersenne, specifically the 29.4b8 release and subsequent releases 30.7 and 30.7 build9 as listed in the CPE. Users operating these versions on any supported operating system harbor the flaw until the vendor issues a patch.

Risk and Exploitability

The CVSS score of 8.6 indicates a high severity for local arbitrary code execution. Because the vulnerability is local, an attacker must have the ability to run Prime95 or influence its configuration; no remote exploitation vector is documented. EPSS data is unavailable, but the flaw is listed as not in the KEV catalog, suggesting limited known exploitation. Nonetheless, the high CVSS and the ability to run arbitrary code with user privileges warrants immediate attention.

Generated by OpenCVE AI on April 30, 2026 at 03:53 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade to the latest Prime95 release (e.g., 30.7 or later) which includes the SEH overflow fix.
  • Delete or rename any older Prime95 binaries from the system to prevent accidental use of the vulnerable version.
  • Disable the proxy hostname field or set it to a benign value such as localhost until the patch is applied.

Generated by OpenCVE AI on April 30, 2026 at 03:53 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Wed, 29 Apr 2026 20:00:00 +0000

Type Values Removed Values Added
Description Prime95 29.4b8 contains a local buffer overflow vulnerability that allows attackers to execute arbitrary code by exploiting structured exception handling (SEH) mechanisms. Attackers can inject malicious payload through the optional proxy hostname field in the PrimeNet connection settings to trigger the overflow and execute system commands.
Title Prime95 29.4b8 Local Buffer Overflow via SEH
First Time appeared Mersenne
Mersenne prime95
Weaknesses CWE-120
CPEs cpe:2.3:a:mersenne:prime95:29.4b8:*:*:*:*:*:*:*
cpe:2.3:a:mersenne:prime95:30.7:-:*:*:*:*:*:*
cpe:2.3:a:mersenne:prime95:30.7:build9:*:*:*:*:*:*
Vendors & Products Mersenne
Mersenne prime95
References
Metrics cvssV3_1

{'score': 8.4, 'vector': 'CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}

cvssV4_0

{'score': 8.6, 'vector': 'CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N'}


Subscriptions

Mersenne Prime95
cve-icon MITRE

Status: PUBLISHED

Assigner: VulnCheck

Published:

Updated: 2026-04-29T19:24:33.105Z

Reserved: 2026-04-29T12:00:33.310Z

Link: CVE-2018-25299

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Received

Published: 2026-04-29T20:16:25.007

Modified: 2026-04-29T20:16:25.007

Link: CVE-2018-25299

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-30T04:00:15Z

Weaknesses