First published: Thu Mar 21 2019(Updated: )
An exploitable buffer overflow vulnerability exists in the PubNub message handler Insteon Hub 2245-222 - Firmware version 1012 for the cc channel of Insteon Hub running firmware version 1012. Specially crafted commands sent through the PubNub service can cause a stack-based buffer overflow overwriting arbitrary data. An attacker can send an authenticated HTTP request At 0x9d014dd8 the value for the id key is copied using strcpy to the buffer at $sp+0x290. This buffer is 32 bytes large, sending anything longer will cause a buffer overflow.
Credit: talos-cna@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Insteon Hub Firmware | =1012 | |
Insteon Hub | =2245-222 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2017-16253 is classified as a high severity vulnerability due to its potential for exploitation through buffer overflow.
To fix CVE-2017-16253, upgrade the Insteon Hub firmware to a secure version that addresses this vulnerability.
Exploiting CVE-2017-16253 can lead to unauthorized code execution on the Insteon Hub and compromise the security of the device.
CVE-2017-16253 affects the Insteon Hub model 2245-222 running firmware version 1012.
CVE-2017-16253 works by allowing specially crafted commands to trigger a stack-based buffer overflow within the PubNub message handler.