Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-f3q9-v3p2-wx3q

Опубликовано: 24 мая 2022
Источник: github
Github: Не прошло ревью

Описание

An issue was discovered in the yh_create_session() function of yubihsm-shell through 2.0.2. The function does not explicitly check the returned session id from the device. An invalid session id would lead to out-of-bounds read and write operations in the session array. This could be used by an attacker to cause a denial of service attack.

An issue was discovered in the yh_create_session() function of yubihsm-shell through 2.0.2. The function does not explicitly check the returned session id from the device. An invalid session id would lead to out-of-bounds read and write operations in the session array. This could be used by an attacker to cause a denial of service attack.

EPSS

Процентиль: 73%
0.00788
Низкий

Дефекты

CWE-613

Связанные уязвимости

CVSS3: 7.5
nvd
больше 5 лет назад

An issue was discovered in the yh_create_session() function of yubihsm-shell through 2.0.2. The function does not explicitly check the returned session id from the device. An invalid session id would lead to out-of-bounds read and write operations in the session array. This could be used by an attacker to cause a denial of service attack.

EPSS

Процентиль: 73%
0.00788
Низкий

Дефекты

CWE-613