logo
Vulnerability feed
CONTRIBUTE

Vulnerability

warn

CVE-2017-16327

Reference to the description:

https://nvd.nist.gov/vuln/detail/CVE-2017-16327

Description:
Multiple exploitable buffer overflow vulnerabilities exist in the PubNub message handler for the "cc" channel of Insteon Hub running firmware version 1012. Specially crafted commands sent through the PubNub service can cause a stack-based buffer overflow overwriting arbitrary data. An attacker should send an authenticated HTTP request to trigger this vulnerability. In cmd s_init_event, at 0x9d01ea88, the value for the `s_event_offset` key is copied using `strcpy` to the buffer at `$sp+0x2b0`.This buffer is 32 bytes large, sending anything longer will cause a buffer overflow.
Last updated date:
01/20/2023
Type:
exploit
Confidence:
HIGH
Date of publishing:
01/20/2023
Reference url to background

https://talosintelligence.com/vulnerability_reports/TALOS-2017-0483

Vulnerability FeedContributorsAboutBlog

@inTheWild

©2024

Privacy Policy