Description
HeidiSQL Portable 10.1.0.5464 contains a denial of service vulnerability that allows local attackers to crash the application by supplying an excessively long string in the password field. Attackers can paste a buffer overflow payload into the password input during Microsoft SQL Server login to trigger an application crash.
Published: 2026-03-22
Score: 6.9 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Denial of Service
Action: Apply Patch
AI Analysis

Impact

HeidiSQL Portable 10.1.0.5464 contains a buffer overflow in the password field used for Microsoft SQL Server authentication. Supplying an excessively long password string overwrites memory, causing the application to crash. The failure only terminates the HeidiSQL process; there is no disclosure of data or compromise of the underlying operating system.

Affected Systems

The vulnerable product is HeidiSQL Portable version 10.1.0.5464 provided by Heidisql. The flaw is triggered when a user opens the Microsoft SQL Server login dialog and enters a string that exceeds the expected length in the password field.

Risk and Exploitability

The CVSS score of 6.9 indicates moderate severity, and the EPSS score is not available. The vulnerability is not listed in CISA’s Known Exploited Vulnerabilities catalog. Exploitation requires local access and user interaction; it is not remotely exploitable. The impact is a denial of service for the local user, with no effect on confidentiality or integrity.

Generated by OpenCVE AI on March 22, 2026 at 16:05 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Update HeidiSQL Portable to the latest version available from the official website.
  • Until a patch is released, avoid entering passwords longer than the maximum expected length in the Microsoft SQL Server login dialog.
  • Monitor the vendor’s advisory page or security mailing lists for a fix.

Generated by OpenCVE AI on March 22, 2026 at 16:05 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Mon, 23 Mar 2026 17:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Mon, 23 Mar 2026 10:00:00 +0000

Type Values Removed Values Added
First Time appeared Heidisql
Heidisql heidisql Portable
Vendors & Products Heidisql
Heidisql heidisql Portable

Sun, 22 Mar 2026 13:45:00 +0000

Type Values Removed Values Added
Description HeidiSQL Portable 10.1.0.5464 contains a denial of service vulnerability that allows local attackers to crash the application by supplying an excessively long string in the password field. Attackers can paste a buffer overflow payload into the password input during Microsoft SQL Server login to trigger an application crash.
Title HeidiSQL Portable 10.1.0.5464 Denial of Service via Buffer Overflow
Weaknesses CWE-787
References
Metrics cvssV3_1

{'score': 6.2, 'vector': 'CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}

cvssV4_0

{'score': 6.9, 'vector': 'CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N'}


Subscriptions

Heidisql Heidisql Portable
cve-icon MITRE

Status: PUBLISHED

Assigner: VulnCheck

Published:

Updated: 2026-03-23T16:02:51.559Z

Reserved: 2026-03-22T12:59:12.654Z

Link: CVE-2019-25598

cve-icon Vulnrichment

Updated: 2026-03-23T16:01:48.214Z

cve-icon NVD

Status : Deferred

Published: 2026-03-22T14:16:26.990

Modified: 2026-04-16T16:19:50.757

Link: CVE-2019-25598

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-03-25T14:46:18Z

Weaknesses