


Perceptive Security
SOC/SIEM Consultancy

Terminal Services Manager 3.1 contains a stack-based buffer overflow vulnerability in the computer names field that allows local attackers to execute arbitrary …
Published:
21 april 2026 om 22:00:00
Alert date:
22 april 2026 om 17:03:04
Source:
nvd.nist.gov
Enterprise Applications, Operating Systems
Terminal Services Manager 3.1 contains a critical stack-based buffer overflow vulnerability in the computer names field. The vulnerability allows local attackers to execute arbitrary code by exploiting structured exception handling (SEH). Attackers can craft malicious input files containing shellcode and jump instructions that overwrite the SEH handler pointer. The exploitation occurs when malicious files are imported through the add computers wizard feature. This vulnerability enables execution of arbitrary payloads including calc.exe or other malicious code. The flaw represents a significant local privilege escalation risk for systems running the affected Terminal Services Manager version.
Technical details
Mitigation steps:
Affected products:
Terminal Services Manager 3.1
Related links:
https://nvd.nist.gov/vuln/detail/CVE-2018-25259
https://lizardsystems.com
https://www.exploit-db.com/exploits/46058
https://www.vulncheck.com/advisories/terminal-services-manager-buffer-overflow-seh
Related CVE's:
Related threat actors:
IOC's:
This article was created with the assistance of AI technology by Perceptive.
