Описание
An issue was discovered in the _send_secure_msg() function of yubihsm-shell through 2.0.2. The function does not validate the embedded length field of a message received from the device. This could lead to an oversized memcpy() call that will crash the running process. This could be used by an attacker to cause a denial of service.
Ссылки
- ExploitThird Party Advisory
- Vendor Advisory
- Third Party Advisory
- Vendor Advisory
- ExploitThird Party Advisory
- Vendor Advisory
- Third Party Advisory
- Vendor Advisory
Уязвимые конфигурации
Конфигурация 1Версия до 2.0.2 (включая)
cpe:2.3:a:yubico:yubihsm-shell:*:*:*:*:*:*:*:*
Конфигурация 2
cpe:2.3:o:fedoraproject:fedora:33:*:*:*:*:*:*:*
EPSS
Процентиль: 73%
0.00788
Низкий
7.5 High
CVSS3
5 Medium
CVSS2
Дефекты
CWE-20
Связанные уязвимости
github
больше 3 лет назад
An issue was discovered in the _send_secure_msg() function of yubihsm-shell through 2.0.2. The function does not validate the embedded length field of a message received from the device. This could lead to an oversized memcpy() call that will crash the running process. This could be used by an attacker to cause a denial of service.
EPSS
Процентиль: 73%
0.00788
Низкий
7.5 High
CVSS3
5 Medium
CVSS2
Дефекты
CWE-20