RarmaRadio 2.72.3 contains a buffer overflow vulnerability in the Server field of the Network settings that allows local attackers to crash the application by supplying an excessively long string. Attackers can paste a malicious payload exceeding 4000 bytes into the Server field via the Settings menu to trigger an application crash.
Subscriptions
No data.
Tracking
Sign in to view the affected projects.
Advisories
No advisories yet.
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
Sun, 22 Mar 2026 00:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | RarmaRadio 2.72.3 contains a buffer overflow vulnerability in the Server field of the Network settings that allows local attackers to crash the application by supplying an excessively long string. Attackers can paste a malicious payload exceeding 4000 bytes into the Server field via the Settings menu to trigger an application crash. | |
| Title | RarmaRadio 2.72.3 Server Field Buffer Overflow Denial of Service | |
| Weaknesses | CWE-787 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: VulnCheck
Published:
Updated: 2026-03-22T00:15:27.961Z
Reserved: 2026-03-21T16:45:02.941Z
Link: CVE-2019-25584
No data.
Status : Received
Published: 2026-03-22T01:16:56.310
Modified: 2026-03-22T01:16:56.310
Link: CVE-2019-25584
No data.
OpenCVE Enrichment
No data.
Weaknesses