An exploitable buffer overflow vulnerability exists in the remote video-host communication of video-core's HTTP server of Samsung SmartThings Hub STH-ETH-250 devices with firmware version 0.20.17. The video-core process insecurely parses the AWSELB cookie while communicating with remote video-host servers, leading to a buffer overflow on the heap. An attacker able to impersonate the remote HTTP servers could trigger this vulnerability.
                
            References
                    | Link | Resource | 
|---|---|
| https://www.talosintelligence.com/vulnerability_reports/TALOS-2018-0591 | Exploit Third Party Advisory | 
| https://www.talosintelligence.com/vulnerability_reports/TALOS-2018-0591 | Exploit Third Party Advisory | 
Configurations
                    Configuration 1 (hide)
| AND | 
            
            
 
  | 
    
History
                    21 Nov 2024, 04:06
| Type | Values Removed | Values Added | 
|---|---|---|
| CVSS | 
        v2 :  v3 :  | 
    
        v2 : 9.0
         v3 : 8.5  | 
| References | () https://www.talosintelligence.com/vulnerability_reports/TALOS-2018-0591 - Exploit, Third Party Advisory | 
Information
                Published : 2018-08-23 15:29
Updated : 2024-11-21 04:06
NVD link : CVE-2018-3925
Mitre link : CVE-2018-3925
CVE.ORG link : CVE-2018-3925
JSON object : View
Products Affected
                samsung
- sth-eth-250_firmware
 - sth-eth-250
 
CWE
                
                    
                        
                        CWE-119
                        
            Improper Restriction of Operations within the Bounds of a Memory Buffer
