The Yubico YubiHSM YubiHSM2 library 2021.08, included in the yubihsm-shell project, does not properly validate the length of some operations including SSH signing requests, and some data operations received from a YubiHSM 2 device.
References
Link | Resource |
---|---|
https://blog.inhq.net/posts/yubico-yubihsm-shell-vuln3/ | Exploit Third Party Advisory |
https://www.yubico.com/support/security-advisories/ysa-2021-04/ | Vendor Advisory |
https://blog.inhq.net/posts/yubico-yubihsm-shell-vuln3/ | Exploit Third Party Advisory |
https://www.yubico.com/support/security-advisories/ysa-2021-04/ | Vendor Advisory |
Configurations
History
21 Nov 2024, 06:29
Type | Values Removed | Values Added |
---|---|---|
References | () https://blog.inhq.net/posts/yubico-yubihsm-shell-vuln3/ - Exploit, Third Party Advisory | |
References | () https://www.yubico.com/support/security-advisories/ysa-2021-04/ - Vendor Advisory |
Information
Published : 2021-12-08 19:15
Updated : 2024-11-21 06:29
NVD link : CVE-2021-43399
Mitre link : CVE-2021-43399
CVE.ORG link : CVE-2021-43399
JSON object : View
Products Affected
yubico
- yubihsm_2_software_development_kit
CWE
CWE-787
Out-of-bounds Write