Prime95 buffer overflow leads to RCE (CVE-2019-25327)
CVE-2019-25327
Remote unauthenticated attackers can execute arbitrary code via a crafted user ID input. Update Prime95 to version 29.8 build 7 or later immediately.
Patch now - CVE-2019-25327 is a critical buffer overflow in Prime95 version 29.8 build 6 that grants unauthenticated remote attackers arbitrary code execution and a full system backdoor. Update to the latest version immediately.
Overview
A critical security flaw has been identified in Prime95, a widely used application for stress-testing computer hardware and contributing to distributed computing projects. This vulnerability allows a remote attacker to take complete control of an affected system.
Vulnerability Explained
In simple terms, the software contains a fundamental programming error in how it handles user input. Specifically, the fields where a user enters their PrimeNet ID and proxy server information do not properly check the length of the text being entered. An attacker can craft a specially designed, overly long string of code (a malicious payload) and paste it into these fields.
Because there is no length check, this code overflows the designated memory buffer. This overflow corrupts the program’s memory and allows the attacker to hijack the program’s execution flow, forcing it to run their own malicious instructions instead.
Potential Impact
The impact of this vulnerability is severe. By exploiting it, an attacker can execute any code they choose on the victim’s computer with the same privileges as the Prime95 process. In the documented proof-of-concept, this code opens a “bind shell” on network port 3110.
This gives the attacker a remote command-line backdoor into the system, enabling them to:
- Install malware, ransomware, or spyware.
- Steal sensitive data.
- Use the compromised machine to attack other systems on the network.
- Disrupt system stability and performance.
Any system running the affected version of Prime95 is at risk, especially if the software is configured to connect to the PrimeNet network.
Remediation and Mitigation
Immediate action is required to protect vulnerable systems.
1. Update Immediately: The primary and most effective solution is to upgrade to a patched version of Prime95. Users should visit the official Mersenne Research, Inc. website to download and install the latest version, which contains a fix for this buffer overflow.
2. Restrict Network Access: As a temporary mitigation if an immediate update is not possible, use host-based or network firewalls to block inbound connections to port 3110 (and other unnecessary ports) from untrusted networks. This can prevent an attacker from connecting to the backdoor shell.
3. Practice Principle of Least Privilege: Avoid running Prime95 with administrative or root privileges. Running it with a standard user account can limit the potential damage of a successful exploit.
IT professionals should identify any instances of Prime95 version 29.8 build 6 within their environment, prioritize its update, and validate that firewall rules are in place to restrict unnecessary network exposure.
Never miss a critical vulnerability
Get real-time security alerts delivered to your preferred platform.
Related Advisories
SD-330AC and AMC Manager provided by silex technology, Inc. contain a heap-based buffer overflow vulnerability in processing the redirect URLs. Arbitrary code may be executed on the device....
Heap buffer overflow in ANGLE in Google Chrome prior to 147.0.7727.101 allowed a remote attacker to potentially perform a sandbox escape via a crafted HTML page. (Chromium security severity: Critical)...
A heap-based buffer overflow vulnerability exists in the Intan CLP parsing functionality of The Biosig Project libbiosig 3.9.2 and Master Branch (db9a9a63). A specially crafted Intan CLP file can lead...
A heap-based buffer overflow vulnerability exists in the Nicolet WFT parsing functionality of The Biosig Project libbiosig 3.9.2 and Master Branch (db9a9a63). A specially crafted .wft file can lead to...