First published: Mon May 10 2021(Updated: )
An issue was discovered in the _send_secure_msg() function of Yubico yubihsm-shell through 2.0.3. The function does not correctly validate the embedded length field of an authenticated message received from the device because response_msg.st.len=8 can be accepted but triggers an integer overflow, which causes CRYPTO_cbc128_decrypt (in OpenSSL) to encounter an undersized buffer and experience a segmentation fault. The yubihsm-shell project is included in the YubiHSM 2 SDK product.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Yubico yubihsm-shell | <=2.0.3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this issue is CVE-2021-32489.
CVE-2021-32489 has a severity rating of 4.4 (medium).
The affected software for CVE-2021-32489 is Yubico yubihsm-shell version 2.0.3.
The CWE ID for CVE-2021-32489 is 190.
To fix CVE-2021-32489, it is recommended to update to a patched version of Yubico yubihsm-shell.