First published: Mon Oct 19 2020(Updated: )
An issue was discovered in the yh_create_session() function of yubihsm-shell through 2.0.2. The function does not explicitly check the returned session id from the device. An invalid session id would lead to out-of-bounds read and write operations in the session array. This could be used by an attacker to cause a denial of service attack.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Yubico yubihsm-shell | <=2.0.2 | |
Fedoraproject Fedora | =33 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID of this issue is CVE-2020-24387.
The severity of CVE-2020-24387 is high with a CVSS score of 7.5.
Yubico yubihsm-shell version up to and including 2.0.2, and Fedora version 33 are affected by CVE-2020-24387.
An attacker can exploit CVE-2020-24387 by using an invalid session ID to perform out-of-bounds read and write operations in the session array.
Yes, you can find references related to CVE-2020-24387 at the following links: [link1](https://blog.inhq.net/posts/yubico-libyubihsm-vuln/), [link2](https://developers.yubico.com/yubihsm-shell/), [link3](https://github.com/Yubico/yubihsm-shell).