Description
Valentina Studio 9.0.5 Linux contains a buffer overflow vulnerability in the Host field of the connection dialog that allows local attackers to crash the application by supplying an oversized input string. Attackers can trigger the vulnerability by pasting a crafted buffer exceeding 264 bytes into the Host field during server connection attempts, causing a denial of service.
Published: 2026-03-21
Score: 6.9 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Denial of Service via local buffer overflow
Action: Patch
AI Analysis

Impact

Valentina Studio 9.0.5 on Linux contains a local buffer overflow in the Host field of the connection dialog. When a user pastes a string longer than 264 bytes, the unvalidated input overflows a confined buffer, corrupting adjacent memory and causing the application to terminate. The flaw is classified as CWE‑787 and results in a denial of service for the user who launched the program; no code execution or privilege escalation is reported by the vendor.

Affected Systems

The vulnerability affects Valentina Studio version 9.0.5 running on Linux operating systems. All installations of that release, regardless of distribution, are affected because the defect exists in the core client code responsible for parsing the Host field. Vendors have not indicated that later releases remove the flaw, so users should verify they are on a newer version.

Risk and Exploitability

The CVSS v3.1 score of 6.9 reflects a medium severity event that requires local access to the machine and legitimate interaction with the application. The absence of an EPSS score and the fact that the vulnerability is not listed in the CISA KEV catalog suggest that exploitation is limited or not widespread at present. An attacker can trigger the crash by simply entering a crafted host string during a connection attempt, resulting in a local denial of service that disrupts database management for the affected user.

Generated by OpenCVE AI on March 21, 2026 at 15:21 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade Valentina Studio to the latest release (≥9.0.6) from the official Valentina‑Db website
  • If an immediate upgrade is not possible, remove the affected application from local systems until a patched version is available

Generated by OpenCVE AI on March 21, 2026 at 15:21 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Thu, 16 Apr 2026 18:15:00 +0000

Type Values Removed Values Added
First Time appeared Linux
Linux linux Kernel
Valentina-db studio
CPEs cpe:2.3:a:valentina-db:studio:9.0.5:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:x64:*
Vendors & Products Linux
Linux linux Kernel
Valentina-db studio

Tue, 24 Mar 2026 15:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Mon, 23 Mar 2026 10:00:00 +0000

Type Values Removed Values Added
First Time appeared Valentina-db
Valentina-db valentina Studio
Vendors & Products Valentina-db
Valentina-db valentina Studio

Sat, 21 Mar 2026 13:00:00 +0000

Type Values Removed Values Added
Description Valentina Studio 9.0.5 Linux contains a buffer overflow vulnerability in the Host field of the connection dialog that allows local attackers to crash the application by supplying an oversized input string. Attackers can trigger the vulnerability by pasting a crafted buffer exceeding 264 bytes into the Host field during server connection attempts, causing a denial of service.
Title Valentina Studio 9.0.5 Linux Buffer Overflow via Host Field
Weaknesses CWE-787
References
Metrics cvssV3_1

{'score': 6.2, 'vector': 'CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}

cvssV4_0

{'score': 6.9, 'vector': 'CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N'}


Subscriptions

Linux Linux Kernel
Valentina-db Studio Valentina Studio
cve-icon MITRE

Status: PUBLISHED

Assigner: VulnCheck

Published:

Updated: 2026-03-24T14:17:40.410Z

Reserved: 2026-03-21T12:35:22.844Z

Link: CVE-2019-25567

cve-icon Vulnrichment

Updated: 2026-03-24T14:17:34.628Z

cve-icon NVD

Status : Analyzed

Published: 2026-03-21T13:16:20.277

Modified: 2026-04-16T18:12:51.933

Link: CVE-2019-25567

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-03-25T14:47:16Z

Weaknesses