Vulnerability Description
An exploitable stack-based buffer overflow vulnerability exists in the retrieval of database fields in the video-core HTTP server of the Samsung SmartThings Hub STH-ETH-250 - Firmware version 0.20.17. The strcpy call overflows the destination buffer, which has a size of 32 bytes. An attacker can send an arbitrarily long "accessKey" value in order to exploit this vulnerability.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Samsung | Sth-Eth-250 Firmware | 0.20.17 |
| Samsung | Sth-Eth-250 | - |
Related Weaknesses (CWE)
References
- https://talosintelligence.com/vulnerability_reports/TALOS-2018-0581ExploitThird Party Advisory
- https://talosintelligence.com/vulnerability_reports/TALOS-2018-0581ExploitThird Party Advisory
FAQ
What is CVE-2018-3913?
CVE-2018-3913 is a vulnerability with a CVSS score of 6.7 (MEDIUM). An exploitable stack-based buffer overflow vulnerability exists in the retrieval of database fields in the video-core HTTP server of the Samsung SmartThings Hub STH-ETH-250 - Firmware version 0.20.17....
How severe is CVE-2018-3913?
CVE-2018-3913 has been rated MEDIUM with a CVSS base score of 6.7/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2018-3913?
Check the references section above for vendor advisories and patch information. Affected products include: Samsung Sth-Eth-250 Firmware, Samsung Sth-Eth-250.