CVE-2017-14452

An exploitable buffer overflow vulnerability exists in the PubNub message handler for the "control" channel of Insteon Hub running firmware version 1012. Specially crafted replies received from the PubNub service can cause buffer overflows on a global section overwriting arbitrary data. A strcpy overflows the buffer insteon_pubnub.channel_cc_r, which has a size of 16 bytes. An attacker can send an arbitrarily long "c_r" parameter in order to exploit this vulnerability. An attacker should impersonate PubNub and answer an HTTPS GET request to trigger this vulnerability.
Configurations

Configuration 1 (hide)

AND
cpe:2.3:o:insteon:hub_firmware:1012:*:*:*:*:*:*:*
cpe:2.3:h:insteon:hub:-:*:*:*:*:*:*:*

History

21 Nov 2024, 03:12

Type Values Removed Values Added
CVSS v2 : 6.5
v3 : 8.8
v2 : 6.5
v3 : 8.5
References () https://www.talosintelligence.com/vulnerability_reports/TALOS-2017-0502 - Exploit, Third Party Advisory () https://www.talosintelligence.com/vulnerability_reports/TALOS-2017-0502 - Exploit, Third Party Advisory

Information

Published : 2018-08-23 18:29

Updated : 2024-11-21 03:12


NVD link : CVE-2017-14452

Mitre link : CVE-2017-14452

CVE.ORG link : CVE-2017-14452


JSON object : View

Products Affected

insteon

  • hub_firmware
  • hub
CWE
CWE-119

Improper Restriction of Operations within the Bounds of a Memory Buffer