An exploitable buffer overflow vulnerability exists in the PubNub message handler for the "control" channel of Insteon Hub running firmware version 1012. Specially crafted replies received from the PubNub service can cause buffer overflows on a global section overwriting arbitrary data. A strcpy overflows the buffer insteon_pubnub.channel_cc_r, which has a size of 16 bytes. An attacker can send an arbitrarily long "c_r" parameter in order to exploit this vulnerability. An attacker should impersonate PubNub and answer an HTTPS GET request to trigger this vulnerability.
Metrics
Affected Vendors & Products
References
History
No history.
MITRE
Status: PUBLISHED
Assigner: talos
Published: 2018-08-23T18:00:00Z
Updated: 2024-09-17T04:28:50.538Z
Reserved: 2017-09-13T00:00:00
Link: CVE-2017-14452
Vulnrichment
No data.
NVD
Status : Modified
Published: 2018-08-23T18:29:00.280
Modified: 2024-11-21T03:12:49.447
Link: CVE-2017-14452
Redhat
No data.