← Retour aux CVEs
CVE-2017-16256
CRITICAL9.9
Description
Multiple exploitable buffer overflow vulnerabilities exist in the PubNub message handler for the "cc" channel of Insteon Hub running firmware version 1012. Specially crafted commands sent through the PubNub service can cause a stack-based buffer overflow overwriting arbitrary data. An attacker should send an authenticated HTTP request to trigger this vulnerability. In cmd sn_sx, at 0x9d014ebc, the value for the `cmd2` key is copied using `strcpy` to the buffer at `$sp+0x2d0`.This buffer is 100 bytes large, sending anything longer will cause a buffer overflow.
Details CVE
Score CVSS v3.19.9
SeveriteCRITICAL
Vecteur CVSSCVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H
Vecteur d'attaqueNETWORK
ComplexiteLOW
Privileges requisLOW
Interaction utilisateurNONE
Publie1/11/2023
Derniere modification11/21/2024
Sourcenvd
Observations honeypot0
Produits affectes
insteon:hubinsteon:hub_firmware
Faiblesses (CWE)
CWE-121CWE-787
References
https://talosintelligence.com/vulnerability_reports/TALOS-2017-0483(talos-cna@cisco.com)
https://talosintelligence.com/vulnerability_reports/TALOS-2017-0483(af854a3a-2127-422b-91ae-364da2661108)
Correlations IOC
Aucune correlation enregistree
This product uses data from the NVD API but is not endorsed or certified by the NVD.