Vulnerability Name: | CVE-2021-32489 (CCN-201760) | ||||||||||||
Assigned: | 2021-03-04 | ||||||||||||
Published: | 2021-03-04 | ||||||||||||
Updated: | 2021-05-19 | ||||||||||||
Summary: | An issue was discovered in the _send_secure_msg() function of Yubico yubihsm-shell through 2.0.3. The function does not correctly validate the embedded length field of an authenticated message received from the device because response_msg.st.len=8 can be accepted but triggers an integer overflow, which causes CRYPTO_cbc128_decrypt (in OpenSSL) to encounter an undersized buffer and experience a segmentation fault. The yubihsm-shell project is included in the YubiHSM 2 SDK product. | ||||||||||||
CVSS v3 Severity: | 4.4 Medium (CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H) 3.9 Low (Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H/E:U/RL:U/RC:R)
3.9 Low (CCN Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H/E:U/RL:U/RC:R)
| ||||||||||||
CVSS v2 Severity: | 3.5 Low (CVSS v2 Vector: AV:N/AC:M/Au:S/C:N/I:N/A:P)
| ||||||||||||
Vulnerability Type: | CWE-190 | ||||||||||||
Vulnerability Consequences: | Denial of Service | ||||||||||||
References: | Source: MITRE Type: CNA CVE-2021-32489 Source: CCN Type: invd Blog, Mar 4, 2021 Yubico libyubihsm?Vulnerabilities (CVE-2021-27217, CVE-2021-32489) Source: MISC Type: Exploit, Third Party Advisory https://blog.inhq.net/posts/yubico-libyubihsm-vuln2/#second-attack-variant-cve-pending Source: XF Type: UNKNOWN yubico-cve202132489-dos(201760) Source: CCN Type: Yubico Web site Yubico | YubiKey Strong Two Factor Authentication | ||||||||||||
Vulnerable Configuration: | Configuration 1: Configuration CCN 1: ![]() | ||||||||||||
BACK |