Vulnerability CVE-2017-16345


Published: 2018-08-02

Description:
An attacker could send an authenticated HTTP request to trigger this vulnerability in Insteon Hub running firmware version 1012. At 0x9d01c318 the value for the s_port key is copied using strcpy to the buffer at 0xa00017f4. This buffer is 6 bytes large, sending anything longer will cause a buffer overflow. The destination can also be shifted by using an sn_speaker parameter between "0" and "3".

Type:

CWE-119

(Improper Restriction of Operations within the Bounds of a Memory Buffer)

CVSS2 => (AV:N/AC:L/Au:S/C:P/I:P/A:C)

CVSS Base Score
Impact Subscore
Exploitability Subscore
8/10
8.5/10
8/10
Exploit range
Attack complexity
Authentication
Remote
Low
Single time
Confidentiality impact
Integrity impact
Availability impact
Partial
Partial
Complete
Affected software
Insteon -> Hub firmware 

 References:
https://www.talosintelligence.com/vulnerability_reports/TALOS-2017-0484

Copyright 2024, cxsecurity.com

 

Back to Top