An issue was discovered in the _send_secure_msg() function of yubihsm-shell through 2.0.2. The function does not validate the embedded length field of a message received from the device. This could lead to an oversized memcpy() call that will crash the running process. This could be used by an attacker to cause a denial of service.
The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly.
Link | Tags |
---|---|
https://github.com/Yubico/yubihsm-shell | third party advisory |
https://developers.yubico.com/yubihsm-shell/ | vendor advisory |
https://www.yubico.com/support/security-advisories/ysa-2020-06/ | vendor advisory |
https://blog.inhq.net/posts/yubico-libyubihsm-vuln/ | third party advisory exploit |
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/Y77KQJW76M3PFOBFLBT6DLH2NWHYRNZO/ | vendor advisory |