CVE-2020-24387
Summary
| CVE | CVE-2020-24387 |
|---|---|
| State | PUBLIC |
| Assigner | [email protected] |
| Source Priority | CVE Program / NVD first with legacy fallback |
| Published | 2020-10-19 20:15:00 UTC |
| Updated | 2023-11-07 03:19:00 UTC |
| Description | An issue was discovered in the yh_create_session() function of yubihsm-shell through 2.0.2. The function does not explicitly check the returned session id from the device. An invalid session id would lead to out-of-bounds read and write operations in the session array. This could be used by an attacker to cause a denial of service attack. |
Risk And Classification
Problem Types: CWE-125 | CWE-787
NVD Known Affected Configurations (CPE 2.3)
| Type | Vendor | Product | Version | Update | Edition | Language |
|---|---|---|---|---|---|---|
| Operating System | Fedoraproject | Fedora | 33 | All | All | All |
| Operating System | Fedoraproject | Fedora | 33 | All | All | All |
| Application | Yubico | Yubihsm-shell | All | All | All | All |
References
| Reference | Source | Link | Tags |
|---|---|---|---|
| GitHub - Yubico/yubihsm-shell: yubihsm-shell and libyubihsm | MISC | github.com | Third Party Advisory |
| [SECURITY] Fedora 33 Update: yubihsm-shell-2.0.3-1.fc33 - package-announce - Fedora Mailing-Lists | lists.fedoraproject.org | ||
| [SECURITY] Fedora 33 Update: yubihsm-shell-2.0.3-1.fc33 - package-announce - Fedora Mailing-Lists | FEDORA | lists.fedoraproject.org | Mailing List, Third Party Advisory |
| Security Advisory YSA-2020-06 | Yubico | MISC | www.yubico.com | Vendor Advisory |
| yubihsm-shell | MISC | developers.yubico.com | Vendor Advisory |
| Yubico libyubihsm Vulnerabilities | invd blog | MISC | blog.inhq.net | Exploit, Third Party Advisory |
| CVE Program record | CVE.ORG | www.cve.org | canonical |
| NVD vulnerability detail | NVD | nvd.nist.gov | canonical, analysis |
No vendor comments have been submitted for this CVE.
There are currently no legacy QID mappings associated with this CVE.