Multiple exploitable buffer overflow vulnerabilities exist in the PubNub message handler for the "cc" channel of Insteon Hub running firmware version 1012. Specially crafted commands sent through the PubNub service can cause a stack-based buffer overflow overwriting arbitrary data. An attacker should send an authenticated HTTP request to trigger this vulnerability. In cmd s_schd, at 0x9d01a144, the value for the `on` key is copied using `strcpy` to the buffer at `$sp+0x290`.This buffer is 32 bytes large, sending anything longer will cause a buffer overflow.
References
Link Resource
https://talosintelligence.com/vulnerability_reports/TALOS-2017-0483 Exploit Third Party Advisory
History

No history.

cve-icon MITRE Information

Status: PUBLISHED

Assigner: talos

Published: 2023-01-11T21:39:52.536Z

Updated:

Reserved: 2017-10-31T00:00:00.000Z


Link: CVE-2017-16294

JSON object: View

cve-icon NVD Information

Status : Analyzed

Published: 2023-01-11T22:15:12.240

Modified: 2023-01-23T17:08:51.647


Link: CVE-2017-16294

JSON object: View

cve-icon Redhat Information

No data.

CWE