An exploitable buffer overflow vulnerability exists in the /cameras/XXXX/clips handler of video-core's HTTP server of Samsung SmartThings Hub STH-ETH-250 Firmware version 0.20.17. The strncpy call overflows the destination buffer, which has a size of 52 bytes. An attacker can send an arbitrarily long 'endTime' value in order to exploit this vulnerability. An attacker can send an HTTP request to trigger this vulnerability.
References
Link Resource
https://talosintelligence.com/vulnerability_reports/TALOS-2018-0570 Exploit Third Party Advisory
History

No history.

cve-icon MITRE Information

Status: PUBLISHED

Assigner: talos

Published: 2018-07-26T00:00:00

Updated: 2022-04-19T18:05:36

Reserved: 2018-01-02T00:00:00


Link: CVE-2018-3895

JSON object: View

cve-icon NVD Information

Status : Analyzed

Published: 2018-08-28T19:29:19.113

Modified: 2022-12-02T22:59:23.323


Link: CVE-2018-3895

JSON object: View

cve-icon Redhat Information

No data.

CWE