CVE-2018-25323: Allok AVI DivX MPEG Converter SEH Buffer Overflow

CVE-2018-25323: Allok AVI DivX MPEG Converter SEH Buffer Overflow

The National Vulnerability Database (NVD) reports CVE-2018-25323, a structured exception handler (SEH) buffer overflow vulnerability in Allok AVI DivX MPEG to DVD Converter version 2.6.1217. This flaw, carrying a CVSSv3.1 score of 8.4 (HIGH), enables local attackers to achieve arbitrary code execution. The attack vector is straightforward: an attacker crafts a malicious text file containing shellcode and SEH chain overwrite values.

To trigger the exploit, the attacker pastes this crafted content directly into the License Name field within the application. This action overflows the buffer, allowing the injected shellcode to execute. While this is a local attack requiring user interaction, the high severity score reflects the complete compromise of confidentiality, integrity, and availability once execution is achieved. The NVD notes the Common Weakness Enumeration (CWE) as CWE-120, a classic buffer overflow.

For defenders, this highlights the persistent risk of legacy software, even for tools that seem innocuous. While Allok AVI DivX MPEG Converter might not be enterprise-grade software, it illustrates how niche applications can introduce critical vulnerabilities on endpoints. Attackers often target these less-scrutinized applications as a means to establish a foothold after initial access, or to escalate privileges on a compromised system. The ease of exploitation, requiring only a paste operation, makes this a concerning vector.

What This Means For You

  • If your organization has legacy systems or allows users to install non-standard software, you must identify instances of Allok AVI DivX MPEG to DVD Converter 2.6.1217 or older. Immediately remove or isolate this application, as it presents a clear path for local privilege escalation and arbitrary code execution.

Related ATT&CK Techniques

🛡️ Detection Rules

3 rules · 6 SIEM formats

3 detection rules auto-generated for this incident, mapped to MITRE ATT&CK. Sigma YAML is free — export to any SIEM format via the Intel Bot.

critical T1190 Initial Access

CVE-2018-25323 - Allok AVI DivX MPEG Converter SEH Buffer Overflow via License Name Field

Sigma YAML — free preview
title: CVE-2018-25323 - Allok AVI DivX MPEG Converter SEH Buffer Overflow via License Name Field
id: scw-2026-05-17-ai-1
status: experimental
level: critical
description: |
  Detects the execution of Allok AVI DivX MPEG Converter.exe with a command line that likely contains a crafted buffer (represented by 'AAAAAA' as a placeholder for a long string of 'A's) intended to trigger the SEH buffer overflow vulnerability. This is a direct indicator of an attempt to exploit CVE-2018-25323 by providing a malicious payload in the License Name field, which is often passed via command line arguments or configuration.
author: SCW Feed Engine (AI-generated)
date: 2026-05-17
references:
  - https://shimiscyberworld.com/posts/nvd-CVE-2018-25323/
tags:
  - attack.initial_access
  - attack.t1190
logsource:
    category: process_creation
detection:
  selection:
      Image|endswith:
          - 'Allok AVI DivX MPEG Converter.exe'
      CommandLine|contains:
          - 'AAAAAA'
      condition: selection
falsepositives:
  - Legitimate administrative activity

Source: Shimi's Cyber World · License & reuse

✓ Sigma · Splunk SPL Sentinel KQL Elastic QRadar AQL Wazuh Get rules for your SIEM →

Indicators of Compromise

IDTypeIndicator
CVE-2018-25323 Buffer Overflow Allok AVI DivX MPEG to DVD Converter 2.6.1217
CVE-2018-25323 RCE Structured Exception Handler (SEH) buffer overflow
CVE-2018-25323 Code Injection Malicious payload in License Name field
Source & Attribution
Source PlatformNVD
ChannelNational Vulnerability Database
PublishedMay 17, 2026 at 16:16 UTC

This content was AI-rewritten and enriched by Shimi's Cyber World based on the original source. All intellectual property rights remain with the original author.

Believe this infringes your rights? Submit a takedown request.

Related coverage

CVE-2026-20240 — Denial of Service

CVE-2026-20240 — In Splunk Enterprise versions below 10.2.2, 10.0.5, 9.4.11, and 9.3.12, and Splunk Cloud Platform versions below 10.4.2603.1, 10.3.2512.9, 10.2.2510.11, 10.1.2507.21, 10.0.2503.13, and 9.3.2411.129,...

vulnerabilityCVEmedium-severitydenial-of-servicecwe-20
/SCW Vulnerability Desk /MEDIUM /6.5 /⚑ 2 IOCs /⚙ 2 Sigma

Splunk Enterprise, Cloud Vulnerability Exposes Session Cookies, Sensitive Data

CVE-2026-20239 — In Splunk Enterprise versions below 10.2.2 and 10.0.5, and Splunk Cloud Platform versions below 10.3.2512.8, 10.2.2510.11, 10.1.2507.21, and 10.0.2503.13, a user with a...

vulnerabilityCVEhigh-severitycwe-532
/SCW Vulnerability Desk /HIGH /7.5 /⚑ 5 IOCs /⚙ 4 Sigma

CVE-2026-20238 — In Splunk AI Toolkit versions below 5.7.3, a low-privileged

CVE-2026-20238 — In Splunk AI Toolkit versions below 5.7.3, a low-privileged user that does not hold the 'admin' or 'power' roles could access confidential data...

vulnerabilityCVEmedium-severitycwe-863
/SCW Vulnerability Desk /MEDIUM /6.5 /⚑ 2 IOCs /⚙ 2 Sigma