CVE-2020-24387
 
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
1Exploited in Wild
-Decision
Descriptions
An issue was discovered in the yh_create_session() function of yubihsm-shell through 2.0.2. The function does not explicitly check the returned session id from the device. An invalid session id would lead to out-of-bounds read and write operations in the session array. This could be used by an attacker to cause a denial of service attack.
Se detectó un problema en la función yh_create_session() de yubihsm-shell versiones hasta 2.0.2. La función no comprueba explícitamente el ID de sesión devuelto por el dispositivo. Un id de sesión no válido conllevaría a operaciones de lectura y escritura fuera de límites en la matriz de sesión. Esto podría ser usado por un atacante para causar un ataque de denegación de servicio
CVSS Scores
SSVC
- Decision:-
Timeline
- 2020-08-19 CVE Reserved
- 2020-10-19 CVE Published
- 2023-11-08 EPSS Updated
- 2024-08-04 CVE Updated
- 2024-08-04 First Exploit
- ---------- Exploited in Wild
- ---------- KEV Due Date
CWE
- CWE-125: Out-of-bounds Read
- CWE-787: Out-of-bounds Write
CAPEC
References (5)
URL | Tag | Source |
---|---|---|
https://github.com/Yubico/yubihsm-shell | Third Party Advisory |
URL | Date | SRC |
---|---|---|
https://blog.inhq.net/posts/yubico-libyubihsm-vuln | 2024-08-04 |
URL | Date | SRC |
---|
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Yubico Search vendor "Yubico" | Yubihsm-shell Search vendor "Yubico" for product "Yubihsm-shell" | <= 2.0.2 Search vendor "Yubico" for product "Yubihsm-shell" and version " <= 2.0.2" | - |
Affected
| ||||||
Fedoraproject Search vendor "Fedoraproject" | Fedora Search vendor "Fedoraproject" for product "Fedora" | 33 Search vendor "Fedoraproject" for product "Fedora" and version "33" | - |
Affected
|