ID CVE-2018-3863
Summary On Samsung SmartThings Hub STH-ETH-250 devices with firmware version 0.20.17, the video-core process incorrectly extracts fields from a user-controlled JSON payload, leading to a buffer overflow on the stack. An attacker can send an HTTP request to trigger this vulnerability. A strcpy overflows the destination buffer, which has a size of 40 bytes. An attacker can send an arbitrarily long "user" value in order to exploit this vulnerability.
References
Vulnerable Configurations
  • cpe:2.3:o:samsung:sth-eth-250_firmware:0.20.17:*:*:*:*:*:*:*
    cpe:2.3:o:samsung:sth-eth-250_firmware:0.20.17:*:*:*:*:*:*:*
  • cpe:2.3:h:samsung:sth-eth-250:-:*:*:*:*:*:*:*
    cpe:2.3:h:samsung:sth-eth-250:-:*:*:*:*:*:*:*
CVSS
Base: 9.0 (as of 26-04-2023 - 18:38)
Impact:
Exploitability:
CWE CWE-787
CAPEC
Access
VectorComplexityAuthentication
NETWORK LOW SINGLE
Impact
ConfidentialityIntegrityAvailability
COMPLETE COMPLETE COMPLETE
cvss-vector via4 AV:N/AC:L/Au:S/C:C/I:C/A:C
refmap via4
misc https://www.talosintelligence.com/vulnerability_reports/TALOS-2018-0548
Last major update 26-04-2023 - 18:38
Published 23-08-2018 - 15:29
Last modified 26-04-2023 - 18:38
Back to Top