CVE-2019-25567
Valentina Studio 9.0.5 Linux Buffer Overflow via Host Field
CVSS Score
6.2
EPSS Score
0.0%
EPSS Percentile
2th
Valentina Studio 9.0.5 Linux contains a buffer overflow vulnerability in the Host field of the connection dialog that allows local attackers to crash the application by supplying an oversized input string. Attackers can trigger the vulnerability by pasting a crafted buffer exceeding 264 bytes into the Host field during server connection attempts, causing a denial of service.
| CWE | CWE-787 |
| Vendor | valentina-db |
| Product | valentina studio |
| Published | Mar 21, 2026 |
| Last Updated | Mar 24, 2026 |
Stay Ahead of the Next One
Get instant alerts for valentina-db valentina studio
Be the first to know when new medium vulnerabilities affecting valentina-db valentina studio are published — delivered to Slack, Telegram or Discord.
Get Free Alerts →
Free · No credit card · 60 sec setup
CVSS v3 Breakdown
CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H Attack Vector
Local
Attack Complexity
Low
Privileges Required
None
User Interaction
None
Scope
Unchanged
Confidentiality
None
Integrity
None
Availability
High
Affected Versions
Valentina-Db / Valentina Studio
9.0.5
References
exploit-db.com: https://www.exploit-db.com/exploits/46439 valentina-db.com: https://valentina-db.com/en/ valentina-db.com: https://www.valentina-db.com/en/all-downloads/vstudio/current/vstudio_x64_lin-deb?format=raw vulncheck.com: https://www.vulncheck.com/advisories/valentina-studio-linux-buffer-overflow-via-host-field
Credits
Alejandra Sánchez