ID

VAR-201809-0080


CVE

CVE-2017-2855


TITLE

Foscam C1 Indoor HD Camera Application firmware buffer error vulnerability

Trust: 0.8

sources: JVNDB: JVNDB-2017-014279

DESCRIPTION

An exploitable buffer overflow vulnerability exists in the DDNS client used by the Foscam C1 Indoor HD Camera running application firmware 2.52.2.43. On devices with DDNS enabled, an attacker who is able to intercept HTTP connections will be able to fully compromise the device by creating a rogue HTTP server. FoscamC1IndoorHDCamera is a wireless HD IP camera from China Foscam. DDNSclient is one of the dynamic domain name service clients

Trust: 2.25

sources: NVD: CVE-2017-2855 // JVNDB: JVNDB-2017-014279 // CNVD: CNVD-2017-34261 // VULHUB: VHN-111058

IOT TAXONOMY

category:['Network device']sub_category: -

Trust: 0.6

category:['camera device']sub_category:smart home camera

Trust: 0.1

sources: OTHER: None // CNVD: CNVD-2017-34261

AFFECTED PRODUCTS

vendor:foscammodel:c1scope:eqversion:2.52.2.43

Trust: 2.4

vendor:foscammodel:systemscope:eqversion:1.9.3.18

Trust: 0.6

vendor:foscammodel:indoor ip camera c1 plug-inscope:eqversion:3.3.0.26

Trust: 0.6

vendor:foscammodel:indoor ip camera c1 applicationscope:eqversion:2.52.2.43

Trust: 0.6

sources: CNVD: CNVD-2017-34261 // JVNDB: JVNDB-2017-014279 // CNNVD: CNNVD-201711-421 // NVD: CVE-2017-2855

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2017-2855
value: HIGH

Trust: 1.0

talos-cna@cisco.com: CVE-2017-2855
value: HIGH

Trust: 1.0

NVD: CVE-2017-2855
value: HIGH

Trust: 0.8

CNVD: CNVD-2017-34261
value: HIGH

Trust: 0.6

CNNVD: CNNVD-201711-421
value: HIGH

Trust: 0.6

VULHUB: VHN-111058
value: HIGH

Trust: 0.1

nvd@nist.gov: CVE-2017-2855
severity: HIGH
baseScore: 9.3
vectorString: AV:N/AC:M/AU:N/C:C/I:C/A:C
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 8.6
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

CNVD: CNVD-2017-34261
severity: HIGH
baseScore: 7.6
vectorString: AV:N/AC:H/AU:N/C:C/I:C/A:C
accessVector: NETWORK
accessComplexity: HIGH
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 4.9
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.6

VULHUB: VHN-111058
severity: HIGH
baseScore: 9.3
vectorString: AV:N/AC:M/AU:N/C:C/I:C/A:C
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 8.6
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

talos-cna@cisco.com: CVE-2017-2855
baseSeverity: HIGH
baseScore: 8.1
vectorString: CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
attackVector: NETWORK
attackComplexity: HIGH
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: 2.2
impactScore: 5.9
version: 3.0

Trust: 1.8

nvd@nist.gov: CVE-2017-2855
baseSeverity: HIGH
baseScore: 8.1
vectorString: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
attackVector: NETWORK
attackComplexity: HIGH
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: 2.2
impactScore: 5.9
version: 3.1

Trust: 1.0

sources: CNVD: CNVD-2017-34261 // VULHUB: VHN-111058 // JVNDB: JVNDB-2017-014279 // CNNVD: CNNVD-201711-421 // NVD: CVE-2017-2855 // NVD: CVE-2017-2855

PROBLEMTYPE DATA

problemtype:CWE-120

Trust: 1.0

problemtype:CWE-119

Trust: 0.9

sources: VULHUB: VHN-111058 // JVNDB: JVNDB-2017-014279 // NVD: CVE-2017-2855

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-201711-421

TYPE

buffer error

Trust: 0.6

sources: CNNVD: CNNVD-201711-421

CONFIGURATIONS

sources: JVNDB: JVNDB-2017-014279

PATCH

title:Top Pageurl:https://www.foscam.com/

Trust: 0.8

title:Patch for FoscamC1IndoorHDCameraDDNS Client Buffer Overflow Vulnerability (CNVD-2017-34261)url:https://www.cnvd.org.cn/patchInfo/show/106247

Trust: 0.6

title:Foscam C1 Indoor HD Camera DDNS Fixes for client buffer error vulnerabilitiesurl:http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=76289

Trust: 0.6

sources: CNVD: CNVD-2017-34261 // JVNDB: JVNDB-2017-014279 // CNNVD: CNNVD-201711-421

EXTERNAL IDS

db:NVDid:CVE-2017-2855

Trust: 3.2

db:TALOSid:TALOS-2017-0358

Trust: 3.1

db:JVNDBid:JVNDB-2017-014279

Trust: 0.8

db:CNNVDid:CNNVD-201711-421

Trust: 0.7

db:CNVDid:CNVD-2017-34261

Trust: 0.6

db:OTHERid:NONE

Trust: 0.1

db:SEEBUGid:SSVID-96857

Trust: 0.1

db:VULHUBid:VHN-111058

Trust: 0.1

sources: OTHER: None // CNVD: CNVD-2017-34261 // VULHUB: VHN-111058 // JVNDB: JVNDB-2017-014279 // CNNVD: CNNVD-201711-421 // NVD: CVE-2017-2855

REFERENCES

url:https://talosintelligence.com/vulnerability_reports/talos-2017-0358

Trust: 2.5

url:https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2017-2855

Trust: 0.8

url:https://nvd.nist.gov/vuln/detail/cve-2017-2855

Trust: 0.8

url:https://www.talosintelligence.com/reports/talos-2017-0358/

Trust: 0.6

url:https://ieeexplore.ieee.org/abstract/document/10769424

Trust: 0.1

sources: OTHER: None // CNVD: CNVD-2017-34261 // VULHUB: VHN-111058 // JVNDB: JVNDB-2017-014279 // CNNVD: CNNVD-201711-421 // NVD: CVE-2017-2855

CREDITS

Claudio Bozzato of Cisco Talos

Trust: 0.6

sources: CNNVD: CNNVD-201711-421

SOURCES

db:OTHERid: -
db:CNVDid:CNVD-2017-34261
db:VULHUBid:VHN-111058
db:JVNDBid:JVNDB-2017-014279
db:CNNVDid:CNNVD-201711-421
db:NVDid:CVE-2017-2855

LAST UPDATE DATE

2025-01-30T19:52:36.303000+00:00


SOURCES UPDATE DATE

db:CNVDid:CNVD-2017-34261date:2017-11-17T00:00:00
db:VULHUBid:VHN-111058date:2018-11-21T00:00:00
db:JVNDBid:JVNDB-2017-014279date:2018-12-20T00:00:00
db:CNNVDid:CNNVD-201711-421date:2022-06-08T00:00:00
db:NVDid:CVE-2017-2855date:2024-11-21T03:24:20.080

SOURCES RELEASE DATE

db:CNVDid:CNVD-2017-34261date:2017-11-17T00:00:00
db:VULHUBid:VHN-111058date:2018-09-19T00:00:00
db:JVNDBid:JVNDB-2017-014279date:2018-12-20T00:00:00
db:CNNVDid:CNNVD-201711-421date:2017-11-14T00:00:00
db:NVDid:CVE-2017-2855date:2018-09-19T16:29:00.443