An issue was discovered in Yubico libykpiv before 2.1.0. An attacker can trigger an incorrect free() in the ykpiv_util_generate_key() function in lib/util.c through incorrect error handling code. This could be used to cause a denial of service attack.
References
Link | Resource |
---|---|
https://blog.inhq.net/posts/yubico-libykpiv-vuln/ | Exploit Third Party Advisory |
https://www.yubico.com/support/security-advisories/ysa-2020-02/ | Vendor Advisory |
https://blog.inhq.net/posts/yubico-libykpiv-vuln/ | Exploit Third Party Advisory |
https://www.yubico.com/support/security-advisories/ysa-2020-02/ | Vendor Advisory |
Configurations
History
21 Nov 2024, 05:00
Type | Values Removed | Values Added |
---|---|---|
References | () https://blog.inhq.net/posts/yubico-libykpiv-vuln/ - Exploit, Third Party Advisory | |
References | () https://www.yubico.com/support/security-advisories/ysa-2020-02/ - Vendor Advisory |
Information
Published : 2020-07-09 18:15
Updated : 2024-11-21 05:00
NVD link : CVE-2020-13132
Mitre link : CVE-2020-13132
CVE.ORG link : CVE-2020-13132
JSON object : View
Products Affected
yubico
- yubikey_smart_card_minidriver
- piv_tool_manager
- libykpiv
CWE
CWE-763
Release of Invalid Pointer or Reference