First published: Tue Aug 28 2018(Updated: )
An exploitable buffer overflow vulnerability exists in the /cameras/XXXX/clips handler of video-core's HTTP server of Samsung SmartThings Hub STH-ETH-250 Firmware version 0.20.17. The strncpy call overflows the destination buffer, which has a size of 52 bytes. An attacker can send an arbitrarily long 'endTime' value in order to exploit this vulnerability. An attacker can send an HTTP request to trigger this vulnerability.
Credit: talos-cna@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Samsung Sth-eth-250 Firmware | =0.20.17 | |
Samsung Sth-eth-250 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2018-3895 has a high severity rating due to the potential for remote code execution through a buffer overflow.
To fix CVE-2018-3895, update the Samsung SmartThings Hub to a version of the firmware that is not vulnerable.
CVE-2018-3895 specifically affects the Samsung SmartThings Hub with firmware version 0.20.17.
CVE-2018-3895 can be exploited through a crafted HTTP request that triggers a buffer overflow.
There are no known workarounds for CVE-2018-3895 besides updating to a secure firmware version.