Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-3q48-rvhc-r6w6

Опубликовано: 16 сент. 2025
Источник: github
Github: Не прошло ревью
CVSS4: 9.3

Описание

A stack-based buffer overflow exists in the UtilConfigHome.csp endpoint of InterSystems Caché 2009.1. The vulnerability is triggered by sending a specially crafted HTTP GET request containing an oversized argument to the .csp handler. Due to insufficient bounds checking, the input overflows a stack buffer, allowing an attacker to overwrite control structures and execute arbitrary code. It is unknown if this vulnerability was patched and an affected version range remains undefined.

A stack-based buffer overflow exists in the UtilConfigHome.csp endpoint of InterSystems Caché 2009.1. The vulnerability is triggered by sending a specially crafted HTTP GET request containing an oversized argument to the .csp handler. Due to insufficient bounds checking, the input overflows a stack buffer, allowing an attacker to overwrite control structures and execute arbitrary code. It is unknown if this vulnerability was patched and an affected version range remains undefined.

EPSS

Процентиль: 99%
0.75584
Высокий

9.3 Critical

CVSS4

Дефекты

CWE-121

Связанные уязвимости

nvd
5 месяцев назад

A stack-based buffer overflow exists in the UtilConfigHome.csp endpoint of InterSystems Caché 2009.1. The vulnerability is triggered by sending a specially crafted HTTP GET request containing an oversized argument to the .csp handler. Due to insufficient bounds checking, the input overflows a stack buffer, allowing an attacker to overwrite control structures and execute arbitrary code. It is unknown if this vulnerability was patched and an affected version range remains undefined.

EPSS

Процентиль: 99%
0.75584
Высокий

9.3 Critical

CVSS4

Дефекты

CWE-121