On Insteon Hub 2245-222 devices with firmware version 1012, specially crafted commands sent through the PubNub service can cause a stack-based buffer overflow overwriting arbitrary data. An attacker should send an authenticated HTTP request to trigger this vulnerability. At 0x9d01ef24 the value for the s_offset key is copied using strcpy to the buffer at $sp+0x2b0. This buffer is 32 bytes large, sending anything longer will cause a buffer overflow.
References
Link | Resource |
---|---|
https://www.talosintelligence.com/vulnerability_reports/TALOS-2017-0483 | Exploit Third Party Advisory |
History
No history.
MITRE Information
Status: PUBLISHED
Assigner: talos
Published: 2018-06-19T00:00:00
Updated: 2022-04-19T18:21:40
Reserved: 2017-10-31T00:00:00
Link: CVE-2017-16337
JSON object: View
NVD Information
Status : Analyzed
Published: 2018-08-23T15:29:00.443
Modified: 2022-12-09T02:29:33.277
Link: CVE-2017-16337
JSON object: View
Redhat Information
No data.
CWE