CVE-2018-14779
Severity CVSS v4.0:
Pending analysis
Type:
CWE-119
Buffer Errors
Publication date:
15/08/2018
Last modified:
25/02/2020
Description
A buffer overflow issue was discovered in the Yubico-Piv 1.5.0 smartcard driver. The file lib/ykpiv.c contains the following code in the function `ykpiv_transfer_data()`: {% highlight c %} if(*out_len + recv_len - 2 > max_out) { fprintf(stderr, "Output buffer to small, wanted to write %lu, max was %lu.", *out_len + recv_len - 2, max_out); } if(out_data) { memcpy(out_data, data, recv_len - 2); out_data += recv_len - 2; *out_len += recv_len - 2; } {% endhighlight %} -- it is clearly checked whether the buffer is big enough to hold the data copied using `memcpy()`, but no error handling happens to avoid the `memcpy()` in such cases. This code path can be triggered with malicious data coming from a smartcard.
Impact
Base Score 3.x
6.80
Severity 3.x
MEDIUM
Base Score 2.0
7.20
Severity 2.0
HIGH
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:a:yubico:piv_manager:*:*:*:*:*:*:*:* | 1.4.2 (excluding) | |
| cpe:2.3:a:yubico:piv_manager:1.4.2:*:*:*:*:*:*:* | ||
| cpe:2.3:a:yubico:piv_manager:1.4.2b:*:*:*:*:*:*:* | ||
| cpe:2.3:a:yubico:piv_manager:1.4.2c:*:*:*:*:*:*:* | ||
| cpe:2.3:a:yubico:piv_manager:1.4.2d:*:*:*:*:*:*:* | ||
| cpe:2.3:a:yubico:piv_manager:1.4.2e:*:*:*:*:*:*:* | ||
| cpe:2.3:a:yubico:piv_manager:1.4.2f:*:*:*:*:*:*:* | ||
| cpe:2.3:a:yubico:piv_manager:1.4.2g:*:*:*:*:*:*:* | ||
| cpe:2.3:a:yubico:piv_tool:*:*:*:*:*:*:*:* | 1.6.0 (excluding) | |
| cpe:2.3:a:yubico:smart_card_minidriver:*:*:*:*:*:*:*:* | 3.7.3.160 (including) |
To consult the complete list of CPE names with products and versions, see this page



