CVE-2018-3916

An exploitable stack-based buffer overflow vulnerability exists in the retrieval of database fields in the video-core HTTP server of the Samsung SmartThings Hub STH-ETH-250 - Firmware version 0.20.17. The strcpy call overflows the destination buffer, which has a size of 136 bytes. An attacker can send an arbitrarily long 'directory' value in order to exploit this vulnerability. An attacker can send an HTTP request to trigger this vulnerability.
Configurations

Configuration 1 (hide)

AND
cpe:2.3:o:samsung:sth-eth-250_firmware:0.20.17:*:*:*:*:*:*:*
cpe:2.3:h:samsung:sth-eth-250:-:*:*:*:*:*:*:*

History

21 Nov 2024, 04:06

Type Values Removed Values Added
References () https://talosintelligence.com/vulnerability_reports/TALOS-2018-0581 - Exploit, Third Party Advisory () https://talosintelligence.com/vulnerability_reports/TALOS-2018-0581 - Exploit, Third Party Advisory

Information

Published : 2018-08-28 20:29

Updated : 2024-11-21 04:06


NVD link : CVE-2018-3916

Mitre link : CVE-2018-3916

CVE.ORG link : CVE-2018-3916


JSON object : View

Products Affected

samsung

  • sth-eth-250_firmware
  • sth-eth-250
CWE
CWE-787

Out-of-bounds Write