Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-rhm6-355p-2674

Опубликовано: 12 янв. 2023
Источник: github
Github: Не прошло ревью
CVSS3: 8.5

Описание

Multiple exploitable buffer overflow vulnerabilities exists in the PubNub message handler for the "control" channel of Insteon Hub running firmware version 1012. Specially crafted replies received from the PubNub service can cause buffer overflows on a global section overwriting arbitrary data. An attacker should impersonate PubNub and answer an HTTPS GET request to trigger this vulnerability. The strcpy at [18] overflows the buffer insteon_pubnub.channel_al, which has a size of 16 bytes.

Multiple exploitable buffer overflow vulnerabilities exists in the PubNub message handler for the "control" channel of Insteon Hub running firmware version 1012. Specially crafted replies received from the PubNub service can cause buffer overflows on a global section overwriting arbitrary data. An attacker should impersonate PubNub and answer an HTTPS GET request to trigger this vulnerability. The strcpy at [18] overflows the buffer insteon_pubnub.channel_al, which has a size of 16 bytes.

EPSS

Процентиль: 66%
0.00526
Низкий

8.5 High

CVSS3

Дефекты

CWE-120

Связанные уязвимости

CVSS3: 8.5
nvd
около 3 лет назад

Multiple exploitable buffer overflow vulnerabilities exists in the PubNub message handler for the "control" channel of Insteon Hub running firmware version 1012. Specially crafted replies received from the PubNub service can cause buffer overflows on a global section overwriting arbitrary data. An attacker should impersonate PubNub and answer an HTTPS GET request to trigger this vulnerability. The `strcpy` at [18] overflows the buffer `insteon_pubnub.channel_al`, which has a size of 16 bytes.

EPSS

Процентиль: 66%
0.00526
Низкий

8.5 High

CVSS3

Дефекты

CWE-120