CVE-2018-25292 Overview
CVE-2018-25292 is a buffer overflow vulnerability [CWE-120] in Bome Restorator 1793, a Windows-based resource editing tool. The flaw resides in the application's Name input field, which fails to enforce length validation on user-supplied data. A local attacker can paste a string exceeding 4000 bytes into the Name field to overflow the underlying buffer and crash the application. Successful exploitation results in a denial-of-service condition affecting the running Restorator process. The vulnerability requires local access and user interaction with the application, limiting remote exploitation scenarios.
Critical Impact
Local attackers can trigger an application crash and denial of service in Bome Restorator 1793 by submitting input larger than 4000 bytes to the Name field.
Affected Products
- Bome Restorator 1793 (Restorator2018 Full build 1793)
- Windows installations using the affected Restorator binary
- Environments distributing Restorator2018_Full_1793.exe
Discovery Timeline
- 2026-04-26 - CVE-2018-25292 published to the National Vulnerability Database
- 2026-04-27 - Last updated in the NVD database
Technical Details for CVE-2018-25292
Vulnerability Analysis
The vulnerability is a classic stack or heap buffer overflow triggered through the application's GUI input handling. Bome Restorator 1793 allocates a fixed-size buffer for the Name field but does not verify the length of pasted or typed input before copying it into that buffer. When the input exceeds approximately 4000 bytes, the write operation overruns the allocated memory region. The corruption causes the process to terminate abnormally, producing a denial-of-service condition. While the public proof of concept demonstrates only a crash, buffer overflows of this class can sometimes be extended toward code execution depending on memory layout and compiler protections.
Root Cause
The root cause is missing bounds checking on the Name text field input handler. The application copies attacker-controlled string data into a fixed-length buffer without validating the source length, matching the pattern described by CWE-120: Buffer Copy without Checking Size of Input. No input sanitization or length truncation is applied before the copy operation.
Attack Vector
Exploitation requires local access to a system running Bome Restorator 1793. The attacker prepares a payload string exceeding 4000 bytes and pastes it into the Name input field within the application interface. Submitting or processing the oversized input causes the buffer overflow and terminates the Restorator process. The vector requires the user to interact with a Restorator project or invoke the affected dialog. No network exposure or elevated privileges are required to trigger the crash. Refer to the Exploit-DB #45223 entry and the VulnCheck Advisory on Bome Restorator for the published proof of concept.
Detection Methods for CVE-2018-25292
Indicators of Compromise
- Unexpected crashes of Restorator.exe recorded in Windows Application event logs with exception codes such as 0xC0000005 (access violation).
- Windows Error Reporting (WER) artifacts referencing the Restorator process and faulting module addresses.
- Presence of project files or clipboard content containing unusually long single-line strings exceeding 4000 bytes targeting the Name field.
Detection Strategies
- Monitor process termination events for Restorator.exe on hosts where the tool is installed and correlate with user session activity.
- Inspect crash dump files generated by WER for stack traces indicating string-copy routines as the faulting function.
- Flag execution of Restorator2018_Full_1793.exe in environments where the vendor-supplied version is not approved for production use.
Monitoring Recommendations
- Enable application crash auditing through Windows Event ID 1000 and forward events to a centralized log platform for review.
- Track installations of Bome Restorator 1793 across managed endpoints using software inventory tooling.
- Alert on creation of large clipboard payloads or scripted paste operations targeting Restorator windows on shared workstations.
How to Mitigate CVE-2018-25292
Immediate Actions Required
- Restrict use of Bome Restorator 1793 to trusted local users and remove the application from shared or multi-user systems where untrusted input may be introduced.
- Avoid opening untrusted project files or pasting unverified data into the Name field within Restorator.
- Inventory all endpoints running Restorator2018_Full_1793.exe and prioritize them for review.
Patch Information
No vendor patch is referenced in the available advisory data for Bome Restorator 1793. Check the Bome Official Website for any updated build that supersedes version 1793 and review the VulnCheck Advisory on Bome Restorator for current remediation status.
Workarounds
- Limit interactive logon rights on hosts running Restorator to reduce the local attack surface.
- Save work frequently to minimize data loss in the event of a crash triggered by malformed input.
- Consider replacing Bome Restorator 1793 with an alternative resource editor in environments where untrusted input cannot be controlled.
- Apply application allow-listing to prevent execution of unapproved Restorator builds on managed endpoints.
Disclaimer: This content was generated using AI. While we strive for accuracy, please verify critical information with official sources.


