Description


Multiple exploitable buffer overflow vulnerabilities exist in the PubNub message handler for the "cc" channel of Insteon Hub running firmware version 1012. Specially crafted commands sent through the PubNub service can cause a stack-based buffer overflow overwriting arbitrary data. An attacker should send an authenticated HTTP request to trigger this vulnerability. In cmd s_schd, at 0x9d01a18c, the value for the `off` key is copied using `strcpy` to the buffer at `$sp+0x270`.This buffer is 16 bytes large, sending anything longer will cause a buffer overflow.

References


https://talosintelligence.com/vulnerability_reports/TALOS-2017-0483

ExploitTechnical DescriptionThird Party Advisory

https://talosintelligence.com/vulnerability_reports/TALOS-2017-0483

ExploitTechnical DescriptionThird Party Advisory

Weaknesses



CWE-121

CVSS impact metrics


CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H

9.9 · Critical

Information


Source identifier

[email protected]

Vulnerability status

Modified

Published

2023-01-11T21:15:12.307Z

2 years ago

Last modified

2024-11-21T02:16:12.023Z

1 year ago