Описание
Multiple exploitable buffer overflow vulnerabilities exist in the PubNub message handler for the "cc" channel of Insteon Hub running firmware version 1012. Specially crafted commands sent through the PubNub service can cause a stack-based buffer overflow overwriting arbitrary data. An attacker should send an authenticated HTTP request to trigger this vulnerability. In cmd s_net, at 0x9d0181ec, the value for the gate
key is copied using strcpy
to the buffer at $sp+0x290
.This buffer is 32 bytes large, sending anything longer will cause a buffer overflow.
Ссылки
- Technical DescriptionThird Party Advisory
- Technical DescriptionThird Party Advisory
Уязвимые конфигурации
Одновременно
EPSS
8.5 High
CVSS3
9.9 Critical
CVSS3
Дефекты
Связанные уязвимости
Multiple exploitable buffer overflow vulnerabilities exist in the PubNub message handler for the "cc" channel of Insteon Hub running firmware version 1012. Specially crafted commands sent through the PubNub service can cause a stack-based buffer overflow overwriting arbitrary data. An attacker should send an authenticated HTTP request to trigger this vulnerability. In cmd s_net, at 0x9d0181ec, the value for the `gate` key is copied using `strcpy` to the buffer at `$sp+0x290`.This buffer is 32 bytes large, sending anything longer will cause a buffer overflow.
EPSS
8.5 High
CVSS3
9.9 Critical
CVSS3