Executive Summary



This Alert is flagged as TOP 25 Common Weakness Enumeration from CWE/SANS. For more information, you can read this.
Summary
Title Yubico PIV Tool vulnerabilities
Informations
NameUSN-4276-1First vendor Publication2020-02-11
VendorUbuntuLast vendor Modification2020-02-11
Severity (Vendor) N/ARevisionN/A

Security-Database Scoring CVSS v2

Cvss vector : (AV:L/AC:L/Au:N/C:C/I:C/A:C)
Cvss Base Score7.2Attack RangeLocal
Cvss Impact Score10Attack ComplexityLow
Cvss Expoit Score3.9AuthenticationNone Required
Calculate full CVSS 2.0 Vectors scores

Detail

A security issue affects these releases of Ubuntu and its derivatives:

- Ubuntu 18.04 LTS

Summary:

Yubico PIV Tool could be made to crash or run programs as an administrator if it received specially crafted input.

Software Description: - yubico-piv-tool: Command line tool for the YubiKey PIV applet

Details:

It was discovered that libykpiv, a supporting library of the Yubico PIV Tool and YubiKey PIV Manager, mishandled specially crafted input. An attacker with a custom-made, malicious USB device could potentially execute arbitrary code on a computer running the Yubico PIV Tool or Yubikey PIV Manager.

Update instructions:

The problem can be corrected by updating your system to the following package versions:

Ubuntu 18.04 LTS:
libykpiv1 1.4.2-2ubuntu0.1
ykcs11 1.4.2-2ubuntu0.1
yubico-piv-tool 1.4.2-2ubuntu0.1

After a standard system update you need to reboot your computer to make all the necessary changes.

References:
https://usn.ubuntu.com/4276-1
CVE-2018-14779, CVE-2018-14780

Package Information:
https://launchpad.net/ubuntu/+source/yubico-piv-tool/1.4.2-2ubuntu0.1

Original Source

Url : http://www.ubuntu.com/usn/USN-4276-1

CWE : Common Weakness Enumeration

%idName
33 %CWE-787Out-of-bounds Write (CWE/SANS Top 25)
33 %CWE-125Out-of-bounds Read
33 %CWE-119Failure to Constrain Operations within the Bounds of a Memory Buffer

CPE : Common Platform Enumeration

TypeDescriptionCount
Application7
Application1

Alert History

If you want to see full details history, please login or register.
0
DateInformations
2020-02-11 17:18:14
  • First insertion