Home

Description

A stack-based buffer overflow exists in the UtilConfigHome.csp endpoint of InterSystems Caché 2009.1. The vulnerability is triggered by sending a specially crafted HTTP GET request containing an oversized argument to the .csp handler. Due to insufficient bounds checking, the input overflows a stack buffer, allowing an attacker to overwrite control structures and execute arbitrary code. It is unknown if this vulnerability was patched and an affected version range remains undefined.

PUBLISHED Reserved 2025-08-27 | Published 2025-09-16 | Updated 2025-09-16 | Assigner VulnCheck




CRITICAL: 9.3CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N

Problem types

CWE-121 Stack-based Buffer Overflow

Product status

Default status
unknown

* (custom)
affected

Credits

MC finder

References

raw.githubusercontent.com/...dows/http/intersystems_cache.rb exploit

www.exploit-db.com/exploits/16807 exploit

www.juniper.net/...res/detail.APP:INTERSYSTEMS-CACHE-OF.html third-party-advisory

www.intersystems.com/products/cache/ product

www.vulncheck.com/...ntersystems-cache-stack-buffer-overflow third-party-advisory

cve.org (CVE-2009-20005)

nvd.nist.gov (CVE-2009-20005)

Download JSON