PT-2023-10589 · Insteon · Insteon Hub
Published
2023-01-11
·
Updated
2023-01-20
·
CVE-2017-16313
CVSS v3.1
8.5
Vector | AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H |
Stack Overflow
Weakness Enumeration
Related Identifiers
Affected Products
Insteon Hub
Published
2023-01-11
·
Updated
2023-01-20
·
CVE-2017-16313
8.5
High
Base vector | Vector | AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H |
Name of the Vulnerable Software and Affected Versions:
Insteon Hub version 1012
Description:
Multiple exploitable buffer overflow vulnerabilities exist in the PubNub message handler for the "cc" channel of Insteon Hub. Specially crafted commands sent through the PubNub service can cause a stack-based buffer overflow overwriting arbitrary data. An attacker should send an authenticated HTTP request to trigger this vulnerability. In cmd s sonos, at 0x9d01c084, the value for the `s ddelay` key is copied using `strcpy` to the buffer at `$sp+0x2b0`. This buffer is 32 bytes large, sending anything longer will cause a buffer overflow.
Recommendations:
As a temporary workaround, consider restricting access to the PubNub message handler for the "cc" channel until a patch is available.
Avoid sending authenticated HTTP requests to the vulnerable endpoint until the issue is resolved.
Restrict the use of the `s ddelay` key in the cmd s sonos to prevent buffer overflow.
At the moment, there is no information about a newer version that contains a fix for this vulnerability.
Stack Overflow