Insufficient length checks in the ShapeShift KeepKey hardware wallet firmware before 7.1.0 allow a stack buffer overflow via crafted messages. The overflow in ethereum_extractThorchainSwapData() in ethereum.c can circumvent stack protections and lead to code execution. The vulnerable interface is reachable remotely over WebUSB.
The product writes data past the end, or before the beginning, of the intended buffer.
Link | Tags |
---|---|
https://github.com/keepkey/keepkey-firmware/releases/tag/v7.1.0 | third party advisory release notes |
https://github.com/keepkey/keepkey-firmware/commit/e49d45594002d4d3fbc1f03488e6dfc0a0a65836 | third party advisory patch |
https://blog.inhq.net/posts/keepkey-CVE-2021-31616/ | patch third party advisory exploit |
https://shapeshift.com/library/keepkey-important-update-issued-april-4-required | vendor advisory |