Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2018-14779

Опубликовано: 15 авг. 2018
Источник: ubuntu
Приоритет: high
CVSS2: 7.2
CVSS3: 6.8

Описание

A buffer overflow issue was discovered in the Yubico-Piv 1.5.0 smartcard driver. The file lib/ykpiv.c contains the following code in the function ykpiv_transfer_data(): {% highlight c %} if(*out_len + recv_len - 2 > max_out) { fprintf(stderr, "Output buffer to small, wanted to write %lu, max was %lu.", *out_len + recv_len - 2, max_out); } if(out_data) { memcpy(out_data, data, recv_len - 2); out_data += recv_len - 2; *out_len += recv_len - 2; } {% endhighlight %} -- it is clearly checked whether the buffer is big enough to hold the data copied using memcpy(), but no error handling happens to avoid the memcpy() in such cases. This code path can be triggered with malicious data coming from a smartcard.

РелизСтатусПримечание
bionic

released

1.4.2-2ubuntu0.1
cosmic

ignored

end of life
devel

not-affected

1.7.0-1
disco

ignored

end of life
eoan

not-affected

1.7.0-1
esm-apps/bionic

released

1.4.2-2ubuntu0.1
esm-apps/focal

not-affected

1.7.0-1
esm-apps/jammy

not-affected

1.7.0-1
esm-apps/xenial

released

1.0.3-1ubuntu0.1~esm1
esm-infra-legacy/trusty

DNE

Показывать по

7.2 High

CVSS2

6.8 Medium

CVSS3

Связанные уязвимости

CVSS3: 6.8
nvd
больше 7 лет назад

A buffer overflow issue was discovered in the Yubico-Piv 1.5.0 smartcard driver. The file lib/ykpiv.c contains the following code in the function `ykpiv_transfer_data()`: {% highlight c %} if(*out_len + recv_len - 2 > max_out) { fprintf(stderr, "Output buffer to small, wanted to write %lu, max was %lu.", *out_len + recv_len - 2, max_out); } if(out_data) { memcpy(out_data, data, recv_len - 2); out_data += recv_len - 2; *out_len += recv_len - 2; } {% endhighlight %} -- it is clearly checked whether the buffer is big enough to hold the data copied using `memcpy()`, but no error handling happens to avoid the `memcpy()` in such cases. This code path can be triggered with malicious data coming from a smartcard.

CVSS3: 6.8
debian
больше 7 лет назад

A buffer overflow issue was discovered in the Yubico-Piv 1.5.0 smartca ...

CVSS3: 6.8
github
больше 3 лет назад

A buffer overflow issue was discovered in the Yubico-Piv 1.5.0 smartcard driver. The file lib/ykpiv.c contains the following code in the function `ykpiv_transfer_data()`: {% highlight c %} if(*out_len + recv_len - 2 > max_out) { fprintf(stderr, "Output buffer to small, wanted to write %lu, max was %lu.", *out_len + recv_len - 2, max_out); } if(out_data) { memcpy(out_data, data, recv_len - 2); out_data += recv_len - 2; *out_len += recv_len - 2; } {% endhighlight %} -- it is clearly checked whether the buffer is big enough to hold the data copied using `memcpy()`, but no error handling happens to avoid the `memcpy()` in such cases. This code path can be triggered with malicious data coming from a smartcard.

suse-cvrf
больше 6 лет назад

Security update for yubico-piv-tool

suse-cvrf
больше 7 лет назад

Security update for yubico-piv-tool

7.2 High

CVSS2

6.8 Medium

CVSS3