First published: Tue Aug 28 2018(Updated: )
An exploitable stack-based buffer overflow vulnerability exists in the retrieval of database fields in the video-core HTTP server of the Samsung SmartThings Hub STH-ETH-250 - Firmware version 0.20.17. The strcpy call overflows the destination buffer, which has a size of 136 bytes. An attacker can send an arbitrarily long 'directory' value in order to exploit this vulnerability. An attacker can send an HTTP request to trigger this vulnerability.
Credit: talos-cna@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Samsung STH-ETH-250 | =0.20.17 | |
Samsung STH-ETH-250 Firmware |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2018-3916 has a high severity rating due to its potential for exploitation through a stack-based buffer overflow.
To fix CVE-2018-3916, update the Samsung SmartThings Hub to a firmware version that addresses this vulnerability.
The implications of CVE-2018-3916 include the potential for remote code execution and unauthorized access through the exploited buffer overflow.
CVE-2018-3916 specifically affects the Samsung SmartThings Hub STH-ETH-250 running firmware version 0.20.17.
Yes, CVE-2018-3916 can be exploited remotely due to vulnerabilities in the video-core HTTP server.