Bug 1619709 (CVE-2018-14779, CVE-2018-14780) - CVE-2018-14779 CVE-2018-14780 yubico-piv-tool: Unchecked Buffer in libykpiv
Summary: CVE-2018-14779 CVE-2018-14780 yubico-piv-tool: Unchecked Buffer in libykpiv
Keywords:
Status: CLOSED ERRATA
Alias: CVE-2018-14779, CVE-2018-14780
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
medium
medium
Target Milestone: ---
Assignee: Red Hat Product Security
QA Contact:
URL:
Whiteboard:
Depends On: 1619710
Blocks:
TreeView+ depends on / blocked
 
Reported: 2018-08-21 14:30 UTC by Andrej Nemec
Modified: 2021-10-25 22:15 UTC (History)
1 user (show)

Fixed In Version: yubico-piv-tool 1.6.0
Doc Type: If docs needed, set a value
Doc Text:
Clone Of:
Environment:
Last Closed: 2021-10-25 22:15:52 UTC
Embargoed:


Attachments (Terms of Use)

Description Andrej Nemec 2018-08-21 14:30:29 UTC
The Libykpiv library prior to version 1.6.0 contains an unchecked buffer, which could allow a buffer overflow. An attacker could use this to attempt to execute malicious code using a specifically crafted USB device masquerading as a YubiKey on a computer where the affected library is currently in use. It is not possible to perform this attack with a genuine YubiKey. In the case of Yubico PIV Tool and YubiKey PIV Manager, malicious code would execute with the same privileges as the user who runs the library. For affected versions of the YubiKey Smart Card Minidriver, malicious code would execute with System level privileges.

External References:

https://www.yubico.com/support/security-advisories/ysa-2018-03/

Comment 1 Andrej Nemec 2018-08-21 14:31:06 UTC
Created yubico-piv-tool tracking bugs for this issue:

Affects: epel-7 [bug 1619710]


Note You need to log in before you can comment on or make changes to this bug.