CVE-2017-16339
Summary
| CVE | CVE-2017-16339 |
|---|---|
| State | PUBLIC |
| Assigner | [email protected] |
| Source Priority | CVE Program / NVD first with legacy fallback |
| Published | 2018-08-02 19:29:00 UTC |
| Updated | 2022-12-09 02:25:00 UTC |
| Description | An attacker could send an authenticated HTTP request to trigger this vulnerability in Insteon Hub running firmware version 1012. At 0x9d01bb1c the value for the uri key is copied using strcpy to the buffer at 0xa00016a0. This buffer is 64 bytes large, sending anything longer will cause a buffer overflow. |
Risk And Classification
Problem Types: CWE-120
NVD Known Affected Configurations (CPE 2.3)
| Type | Vendor | Product | Version | Update | Edition | Language |
|---|---|---|---|---|---|---|
| Hardware | Insteon | Hub | - | All | All | All |
| Hardware | Insteon | Hub | - | All | All | All |
| Operating System | Insteon | Hub Firmware | 1012 | All | All | All |
| Operating System | Insteon | Hub Firmware | 1012 | All | All | All |
References
| Reference | Source | Link | Tags |
|---|---|---|---|
| TALOS-2017-0484 || Cisco Talos Intelligence Group - Comprehensive Threat Intelligence | MISC | www.talosintelligence.com | Exploit, Third Party Advisory |
| CVE Program record | CVE.ORG | www.cve.org | canonical |
| NVD vulnerability detail | NVD | nvd.nist.gov | canonical, analysis |
No vendor comments have been submitted for this CVE.
There are currently no legacy QID mappings associated with this CVE.