Multiple exploitable buffer overflow vulnerabilities exist in the PubNub message handler for the "cc" channel of Insteon Hub running firmware version 1012. Specially crafted commands sent through the PubNub service can cause a stack-based buffer overflow overwriting arbitrary data. An attacker should send an authenticated HTTP request to trigger this vulnerability. In cmd sn_exw, at 0x9d01b20c, the value for the `id` key is copied using `strcpy` to the buffer at `$sp+0x290`.This buffer is 32 bytes large, sending anything longer will cause a buffer overflow.
Metrics
Affected Vendors & Products
References
History
No history.
MITRE
Status: PUBLISHED
Assigner: talos
Published: 2023-01-11T21:39:53.841Z
Updated: 2024-08-05T20:20:05.589Z
Reserved: 2017-10-31T00:00:00.000Z
Link: CVE-2017-16305
Vulnrichment
No data.
NVD
Status : Modified
Published: 2023-01-11T22:15:12.960
Modified: 2024-11-21T03:16:13.187
Link: CVE-2017-16305
Redhat
No data.