Логотип exploitDog
bind:"CVE-2018-14779"
Консоль
Логотип exploitDog

exploitDog

bind:"CVE-2018-14779"

Количество 7

Количество 7

ubuntu логотип

CVE-2018-14779

больше 7 лет назад

A buffer overflow issue was discovered in the Yubico-Piv 1.5.0 smartcard driver. The file lib/ykpiv.c contains the following code in the function `ykpiv_transfer_data()`: {% highlight c %} if(*out_len + recv_len - 2 > max_out) { fprintf(stderr, "Output buffer to small, wanted to write %lu, max was %lu.", *out_len + recv_len - 2, max_out); } if(out_data) { memcpy(out_data, data, recv_len - 2); out_data += recv_len - 2; *out_len += recv_len - 2; } {% endhighlight %} -- it is clearly checked whether the buffer is big enough to hold the data copied using `memcpy()`, but no error handling happens to avoid the `memcpy()` in such cases. This code path can be triggered with malicious data coming from a smartcard.

CVSS3: 6.8
EPSS: Низкий
nvd логотип

CVE-2018-14779

больше 7 лет назад

A buffer overflow issue was discovered in the Yubico-Piv 1.5.0 smartcard driver. The file lib/ykpiv.c contains the following code in the function `ykpiv_transfer_data()`: {% highlight c %} if(*out_len + recv_len - 2 > max_out) { fprintf(stderr, "Output buffer to small, wanted to write %lu, max was %lu.", *out_len + recv_len - 2, max_out); } if(out_data) { memcpy(out_data, data, recv_len - 2); out_data += recv_len - 2; *out_len += recv_len - 2; } {% endhighlight %} -- it is clearly checked whether the buffer is big enough to hold the data copied using `memcpy()`, but no error handling happens to avoid the `memcpy()` in such cases. This code path can be triggered with malicious data coming from a smartcard.

CVSS3: 6.8
EPSS: Низкий
debian логотип

CVE-2018-14779

больше 7 лет назад

A buffer overflow issue was discovered in the Yubico-Piv 1.5.0 smartca ...

CVSS3: 6.8
EPSS: Низкий
github логотип

GHSA-rvwc-p7mj-cmgq

больше 3 лет назад

A buffer overflow issue was discovered in the Yubico-Piv 1.5.0 smartcard driver. The file lib/ykpiv.c contains the following code in the function `ykpiv_transfer_data()`: {% highlight c %} if(*out_len + recv_len - 2 > max_out) { fprintf(stderr, "Output buffer to small, wanted to write %lu, max was %lu.", *out_len + recv_len - 2, max_out); } if(out_data) { memcpy(out_data, data, recv_len - 2); out_data += recv_len - 2; *out_len += recv_len - 2; } {% endhighlight %} -- it is clearly checked whether the buffer is big enough to hold the data copied using `memcpy()`, but no error handling happens to avoid the `memcpy()` in such cases. This code path can be triggered with malicious data coming from a smartcard.

CVSS3: 6.8
EPSS: Низкий
suse-cvrf логотип

openSUSE-SU-2019:1341-1

почти 7 лет назад

Security update for yubico-piv-tool

EPSS: Низкий
suse-cvrf логотип

openSUSE-SU-2018:2623-1

больше 7 лет назад

Security update for yubico-piv-tool

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2019:1123-1

почти 7 лет назад

Security update for yubico-piv-tool

EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
ubuntu логотип
CVE-2018-14779

A buffer overflow issue was discovered in the Yubico-Piv 1.5.0 smartcard driver. The file lib/ykpiv.c contains the following code in the function `ykpiv_transfer_data()`: {% highlight c %} if(*out_len + recv_len - 2 > max_out) { fprintf(stderr, "Output buffer to small, wanted to write %lu, max was %lu.", *out_len + recv_len - 2, max_out); } if(out_data) { memcpy(out_data, data, recv_len - 2); out_data += recv_len - 2; *out_len += recv_len - 2; } {% endhighlight %} -- it is clearly checked whether the buffer is big enough to hold the data copied using `memcpy()`, but no error handling happens to avoid the `memcpy()` in such cases. This code path can be triggered with malicious data coming from a smartcard.

CVSS3: 6.8
0%
Низкий
больше 7 лет назад
nvd логотип
CVE-2018-14779

A buffer overflow issue was discovered in the Yubico-Piv 1.5.0 smartcard driver. The file lib/ykpiv.c contains the following code in the function `ykpiv_transfer_data()`: {% highlight c %} if(*out_len + recv_len - 2 > max_out) { fprintf(stderr, "Output buffer to small, wanted to write %lu, max was %lu.", *out_len + recv_len - 2, max_out); } if(out_data) { memcpy(out_data, data, recv_len - 2); out_data += recv_len - 2; *out_len += recv_len - 2; } {% endhighlight %} -- it is clearly checked whether the buffer is big enough to hold the data copied using `memcpy()`, but no error handling happens to avoid the `memcpy()` in such cases. This code path can be triggered with malicious data coming from a smartcard.

CVSS3: 6.8
0%
Низкий
больше 7 лет назад
debian логотип
CVE-2018-14779

A buffer overflow issue was discovered in the Yubico-Piv 1.5.0 smartca ...

CVSS3: 6.8
0%
Низкий
больше 7 лет назад
github логотип
GHSA-rvwc-p7mj-cmgq

A buffer overflow issue was discovered in the Yubico-Piv 1.5.0 smartcard driver. The file lib/ykpiv.c contains the following code in the function `ykpiv_transfer_data()`: {% highlight c %} if(*out_len + recv_len - 2 > max_out) { fprintf(stderr, "Output buffer to small, wanted to write %lu, max was %lu.", *out_len + recv_len - 2, max_out); } if(out_data) { memcpy(out_data, data, recv_len - 2); out_data += recv_len - 2; *out_len += recv_len - 2; } {% endhighlight %} -- it is clearly checked whether the buffer is big enough to hold the data copied using `memcpy()`, but no error handling happens to avoid the `memcpy()` in such cases. This code path can be triggered with malicious data coming from a smartcard.

CVSS3: 6.8
0%
Низкий
больше 3 лет назад
suse-cvrf логотип
openSUSE-SU-2019:1341-1

Security update for yubico-piv-tool

почти 7 лет назад
suse-cvrf логотип
openSUSE-SU-2018:2623-1

Security update for yubico-piv-tool

больше 7 лет назад
suse-cvrf логотип
SUSE-SU-2019:1123-1

Security update for yubico-piv-tool

почти 7 лет назад

Уязвимостей на страницу