ID CVE-2018-3912
Summary On Samsung SmartThings Hub STH-ETH-250 devices with firmware version 0.20.17, the video-core process insecurely extracts the fields from the "shard" table of its SQLite database, leading to a buffer overflow on the stack. The strcpy call overflows the destination buffer, which has a size of 128 bytes. An attacker can send an arbitrarily long "secretKey" value in order to exploit this vulnerability.
References
Vulnerable Configurations
  • cpe:2.3:o:samsung:sth-eth-250_firmware:0.20.17:*:*:*:*:*:*:*
    cpe:2.3:o:samsung:sth-eth-250_firmware:0.20.17:*:*:*:*:*:*:*
  • cpe:2.3:h:samsung:sth-eth-250:-:*:*:*:*:*:*:*
    cpe:2.3:h:samsung:sth-eth-250:-:*:*:*:*:*:*:*
CVSS
Base: 6.9 (as of 17-02-2023 - 03:43)
Impact:
Exploitability:
CWE CWE-787
CAPEC
Access
VectorComplexityAuthentication
LOCAL MEDIUM NONE
Impact
ConfidentialityIntegrityAvailability
COMPLETE COMPLETE COMPLETE
cvss-vector via4 AV:L/AC:M/Au:N/C:C/I:C/A:C
refmap via4
misc https://www.talosintelligence.com/vulnerability_reports/TALOS-2018-0581
Last major update 17-02-2023 - 03:43
Published 23-08-2018 - 18:29
Last modified 17-02-2023 - 03:43
Back to Top