6.8
CVSSv3

CVE-2018-20340

Published: 21/03/2019 Updated: 05/12/2019
CVSS v2 Base Score: 4.6 | Impact Score: 6.4 | Exploitability Score: 3.9
CVSS v3 Base Score: 6.8 | Impact Score: 5.9 | Exploitability Score: 0.9
VMScore: 409
Vector: AV:L/AC:L/Au:N/C:P/I:P/A:P

Vulnerability Summary

Yubico libu2f-host 1.1.6 contains unchecked buffers in devs.c, which could enable a malicious token to exploit a buffer overflow. An attacker could use this to attempt to execute malicious code using a crafted USB device masquerading as a security token on a computer where the affected library is currently in use. It is not possible to perform this attack with a genuine YubiKey.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

yubico libu2f-host 1.1.6

debian debian linux 9.0

Vendor Advisories

Debian Bug report logs - #921726 libu2f-host: CVE-2018-20340 Package: src:libu2f-host; Maintainer for src:libu2f-host is Debian Authentication Maintainers <team+auth@trackerdebianorg>; Reported by: Sébastien Delafond <seb@debianorg> Date: Fri, 8 Feb 2019 13:15:02 UTC Severity: grave Tags: security, upstream Merg ...
Yubico library libu2f-host prior to version 117 contains an unchecked buffer, which could allow a buffer overflow Libu2f-host is a library that implements the host party of the U2F protocol This issue can allow an attacker with a custom made malicious USB device masquerading as a security key, and physical access to a computer where PAM U2F or ...