An issue was discovered in Yubico libykpiv before 2.1.0. An attacker can trigger an incorrect free() in the ykpiv_util_generate_key() function in lib/util.c through incorrect error handling code. This could be used to cause a denial of service attack.
The product attempts to return a memory resource to the system, but it calls the wrong release function or calls the appropriate release function incorrectly.
Link | Tags |
---|---|
https://blog.inhq.net/posts/yubico-libykpiv-vuln/ | third party advisory exploit |
https://www.yubico.com/support/security-advisories/ysa-2020-02/ | vendor advisory |