A stack-based buffer overflow exists in the UtilConfigHome.csp endpoint of InterSystems Caché 2009.1. The vulnerability is triggered by sending a specially crafted HTTP GET request containing an oversized argument to the .csp handler. Due to insufficient bounds checking, the input overflows a stack buffer, allowing an attacker to overwrite control structures and execute arbitrary code. It is unknown if this vulnerability was patched and an affected version range remains undefined.
CVSS
No CVSS.
References
Configurations
No configuration.
History
16 Sep 2025, 19:15
Type | Values Removed | Values Added |
---|---|---|
References | () https://raw.githubusercontent.com/rapid7/metasploit-framework/master/modules/exploits/windows/http/intersystems_cache.rb - | |
References | () https://www.exploit-db.com/exploits/16807 - |
16 Sep 2025, 15:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2025-09-16 15:15
Updated : 2025-09-17 14:18
NVD link : CVE-2009-20005
Mitre link : CVE-2009-20005
CVE.ORG link : CVE-2009-20005
JSON object : View
Products Affected
No product.
CWE
CWE-121
Stack-based Buffer Overflow