First published: Thu Mar 21 2019(Updated: )
An exploitable buffer overflow vulnerability exists in the PubNub message handler Insteon Hub 2245-222 - Firmware version 1012. Specially crafted commands sent through the PubNub service can cause a stack-based buffer overflow overwriting arbitrary data. An attacker can send an authenticated HTTP request at At 0x9d014e84 the value for the cmd1 key is copied using strcpy to the buffer at $sp+0x280. This buffer is 16 bytes large.
Credit: talos-cna@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Insteon Hub Firmware | =1012 | |
Insteon Hub | =2245-222 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2017-16255 is considered a critical vulnerability due to the potential for arbitrary code execution through a buffer overflow.
To fix CVE-2017-16255, upgrade the Insteon Hub to the latest firmware version that addresses the buffer overflow issue.
CVE-2017-16255 can be exploited by an attacker sending specially crafted commands through the PubNub service to execute arbitrary code.
CVE-2017-16255 specifically affects the Insteon Hub 2245-222 with firmware version 1012.
Yes, an attacker needs to send authenticated HTTP requests to exploit CVE-2017-16255.