The Yubico YubiHSM YubiHSM2 library 2021.08, included in the yubihsm-shell project, does not properly validate the length of some operations including SSH signing requests, and some data operations received from a YubiHSM 2 device.
                
            References
                    | Link | Resource | 
|---|---|
| https://blog.inhq.net/posts/yubico-yubihsm-shell-vuln3/ | Exploit Third Party Advisory | 
| https://www.yubico.com/support/security-advisories/ysa-2021-04/ | Vendor Advisory | 
| https://blog.inhq.net/posts/yubico-yubihsm-shell-vuln3/ | Exploit Third Party Advisory | 
| https://www.yubico.com/support/security-advisories/ysa-2021-04/ | Vendor Advisory | 
Configurations
                    History
                    21 Nov 2024, 06:29
| Type | Values Removed | Values Added | 
|---|---|---|
| References | () https://blog.inhq.net/posts/yubico-yubihsm-shell-vuln3/ - Exploit, Third Party Advisory | |
| References | () https://www.yubico.com/support/security-advisories/ysa-2021-04/ - Vendor Advisory | 
Information
                Published : 2021-12-08 19:15
Updated : 2024-11-21 06:29
NVD link : CVE-2021-43399
Mitre link : CVE-2021-43399
CVE.ORG link : CVE-2021-43399
JSON object : View
Products Affected
                yubico
- yubihsm_2_software_development_kit
CWE
                
                    
                        
                        CWE-787
                        
            Out-of-bounds Write
