Stack-Based Buffer Overflow in Microchip MPLAB IDE
CVE-2009-1674

Currently unrated

Key Information:

Vendor

Microchip

Status
Vendor
CVE Published:
18 May 2009

Badges

๐Ÿ‘พ Exploit Exists๐ŸŸก Public PoC๐ŸŸฃ EPSS 17%

What is CVE-2009-1674?

A stack-based buffer overflow vulnerability exists in Microchip MPLAB IDE 8.30 that could be exploited by remote attackers. The issue is triggered when a long .cof pathname in the [TOOL_SETTINGS] section of a .mcp project file is processed, potentially allowing attackers to execute arbitrary code on the target system. This vulnerability may be related to similar issues identified in other advisories, underscoring the importance of maintaining security best practices and applying relevant security patches.

Exploit Proof of Concept (PoC)

PoC code is written by security researchers to demonstrate the vulnerability can be exploited. PoC code is also a key component for weaponization which could lead to ransomware.

References

EPSS Score

17% chance of being exploited in the next 30 days.

Timeline

  • ๐ŸŸก

    Public PoC available

  • ๐Ÿ‘พ

    Exploit known to exist

  • Vulnerability published

  • Vulnerability Reserved

.