Vulnerability Details : CVE-2020-24388
Potential exploit
An issue was discovered in the _send_secure_msg() function of yubihsm-shell through 2.0.2. The function does not validate the embedded length field of a message received from the device. This could lead to an oversized memcpy() call that will crash the running process. This could be used by an attacker to cause a denial of service.
Vulnerability category: Memory CorruptionInput validationDenial of service
Products affected by CVE-2020-24388
- cpe:2.3:o:fedoraproject:fedora:33:*:*:*:*:*:*:*
- cpe:2.3:a:yubico:yubihsm-shell:*:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2020-24388
0.79%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 72 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2020-24388
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
5.0
|
MEDIUM | AV:N/AC:L/Au:N/C:N/I:N/A:P |
10.0
|
2.9
|
NIST | |
7.5
|
HIGH | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H |
3.9
|
3.6
|
NIST |
CWE ids for CVE-2020-24388
-
The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly.Assigned by: nvd@nist.gov (Primary)
-
The product writes data past the end, or before the beginning, of the intended buffer.Assigned by: nvd@nist.gov (Primary)
References for CVE-2020-24388
-
https://blog.inhq.net/posts/yubico-libyubihsm-vuln/
Yubico libyubihsm Vulnerabilities | invd blogExploit;Third Party Advisory
-
https://developers.yubico.com/yubihsm-shell/
yubihsm-shellVendor Advisory
-
https://github.com/Yubico/yubihsm-shell
GitHub - Yubico/yubihsm-shell: yubihsm-shell and libyubihsmThird Party Advisory
-
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Y77KQJW76M3PFOBFLBT6DLH2NWHYRNZO/
[SECURITY] Fedora 33 Update: yubihsm-shell-2.0.3-1.fc33 - package-announce - Fedora Mailing-ListsMailing List;Third Party Advisory
-
https://www.yubico.com/support/security-advisories/ysa-2020-06/
Security Advisory YSA-2020-06 | YubicoVendor Advisory
Jump to