CVE-2017-16304

2 months ago 12

Received


This vulnerability has been received by the NVD and has not been analyzed.

Description

Multiple exploitable buffer overflow vulnerabilities beryllium successful the PubNub connection handler for the "cc" transmission of Insteon Hub moving firmware mentation 1012. Specially crafted commands sent done the PubNub work tin origin a stack-based buffer overflow overwriting arbitrary data. An attacker should nonstop an authenticated HTTP petition to trigger this vulnerability. In cmd sn_ex, astatine 0x9d01ae40, the worth for the `d` cardinal is copied utilizing `strcpy` to the buffer astatine `$sp+0x334`.This buffer is 100 bytes large, sending thing longer volition origin a buffer overflow.


Severity

CVSS 3.x Severity and Metrics:


NIST CVSS score

NIST: NVD

Base Score:  N/A

NVD score not yet provided.


Nist CVSS people     does not lucifer  with CNA score

CNA:  Talos

Vector:  CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H

References to Advisories, Solutions, and Tools

By selecting these links, you volition beryllium leaving NIST webspace. We person provided these links to different web sites due to the fact that they may person accusation that would beryllium of involvement to you. No inferences should beryllium drawn connected relationship of different sites being referenced, oregon not, from this page. There whitethorn beryllium different web sites that are much due for your purpose. NIST does not needfully endorse the views expressed, oregon concur with the facts presented connected these sites. Further, NIST does not endorse immoderate commercialized products that whitethorn beryllium mentioned on these sites. Please code comments astir this leafage to [email protected].

Weakness Enumeration

CWE-ID CWE Name Source
CWE-121 Stack-based Buffer Overflow Provider acceptance level Talos  

Change History

0 alteration records recovered show changes

Read Entire Article