Show plain JSON{"configurations": [{"nodes": [{"cpeMatch": [{"criteria": "cpe:2.3:a:yubico:yubihsm-shell:*:*:*:*:*:*:*:*", "matchCriteriaId": "9F7C9BAC-A77B-4333-A29C-4EABAF1B7003", "versionEndIncluding": "2.0.3", "vulnerable": true}], "negate": false, "operator": "OR"}]}], "descriptions": [{"lang": "en", "value": "An issue was discovered in the _send_secure_msg() function of Yubico yubihsm-shell through 2.0.3. The function does not correctly validate the embedded length field of an authenticated message received from the device. Out-of-bounds reads performed by aes_remove_padding() can crash the running process, depending on the memory layout. This could be used by an attacker to cause a client-side denial of service. The yubihsm-shell project is included in the YubiHSM 2 SDK product."}, {"lang": "es", "value": "Se detect\u00f3 un problema en la funci\u00f3n _send_secure_msg() de Yubico yubihsm-shell versiones hasta de 2.0.3. La funci\u00f3n no comprueba correctamente el campo de longitud insertado de un mensaje autenticado recibido del dispositivo. Lecturas fuera de l\u00edmites llevadas a cabo por la funci\u00f3n aes_remove_padding() pueden bloquear el proceso en ejecuci\u00f3n, dependiendo del dise\u00f1o de la memoria. Esto podr\u00eda ser usado por un atacante para conllevar una denegaci\u00f3n de servicio del lado del cliente. El proyecto yubihsm-shell est\u00e1 incluido en el producto YubiHSM 2 SDK"}], "id": "CVE-2021-27217", "lastModified": "2024-11-21T05:57:37.090", "metrics": {"cvssMetricV2": [{"acInsufInfo": false, "baseSeverity": "LOW", "cvssData": {"accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "PARTIAL", "baseScore": 3.5, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:S/C:N/I:N/A:P", "version": "2.0"}, "exploitabilityScore": 6.8, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false}], "cvssMetricV31": [{"cvssData": {"attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 4.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H", "version": "3.1"}, "exploitabilityScore": 0.7, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary"}]}, "published": "2021-03-04T18:15:14.050", "references": [{"source": "cve@mitre.org", "tags": ["Exploit", "Third Party Advisory"], "url": "https://blog.inhq.net/posts/yubico-libyubihsm-vuln2"}, {"source": "cve@mitre.org", "tags": ["Release Notes", "Third Party Advisory"], "url": "https://github.com/Yubico/yubihsm-shell/releases"}, {"source": "cve@mitre.org", "tags": ["Vendor Advisory"], "url": "https://www.yubico.com/support/security-advisories/ysa-2021-01/"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Exploit", "Third Party Advisory"], "url": "https://blog.inhq.net/posts/yubico-libyubihsm-vuln2"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Release Notes", "Third Party Advisory"], "url": "https://github.com/Yubico/yubihsm-shell/releases"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Vendor Advisory"], "url": "https://www.yubico.com/support/security-advisories/ysa-2021-01/"}], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [{"description": [{"lang": "en", "value": "CWE-125"}], "source": "nvd@nist.gov", "type": "Primary"}]}