Protect yourself against future threats.
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 =========================================================================== AUSCERT External Security Bulletin Redistribution ESB-2020.0482 USN-4276-1: Yubico PIV Tool vulnerabilities 12 February 2020 =========================================================================== AusCERT Security Bulletin Summary --------------------------------- Product: Yubico PIV Tool Publisher: Ubuntu Operating System: Ubuntu Impact/Access: Execute Arbitrary Code/Commands -- Console/Physical Access Privileged Data -- Console/Physical Resolution: Patch/Upgrade CVE Names: CVE-2018-14780 CVE-2018-14779 Reference: ESB-2019.1479 ESB-2018.2351 Original Bulletin: https://usn.ubuntu.com/4276-1/ - --------------------------BEGIN INCLUDED TEXT-------------------- USN-4276-1: Yubico PIV Tool vulnerabilities 11 February 2020 Yubico PIV Tool vulnerabilities A security issue affects these releases of Ubuntu and its derivatives: o Ubuntu 18.04 LTS Summary Yubico PIV Tool could be made to crash or run programs as an administrator if it received specially crafted input. Software Description o yubico-piv-tool - Command line tool for the YubiKey PIV applet Details It was discovered that libykpiv, a supporting library of the Yubico PIV Tool and YubiKey PIV Manager, mishandled specially crafted input. An attacker with a custom-made, malicious USB device could potentially execute arbitrary code on a computer running the Yubico PIV Tool or Yubikey PIV Manager. Update instructions The problem can be corrected by updating your system to the following package versions: Ubuntu 18.04 LTS libykpiv1 - 1.4.2-2ubuntu0.1 ykcs11 - 1.4.2-2ubuntu0.1 yubico-piv-tool - 1.4.2-2ubuntu0.1 To update your system, please follow these instructions: https:// wiki.ubuntu.com/Security/Upgrades . After a standard system update you need to reboot your computer to make all the necessary changes. References o CVE-2018-14779 o CVE-2018-14780 - --------------------------END INCLUDED TEXT-------------------- You have received this e-mail bulletin as a result of your organisation's registration with AusCERT. The mailing list you are subscribed to is maintained within your organisation, so if you do not wish to continue receiving these bulletins you should contact your local IT manager. If you do not know who that is, please send an email to auscert@auscert.org.au and we will forward your request to the appropriate person. NOTE: Third Party Rights This security bulletin is provided as a service to AusCERT's members. As AusCERT did not write the document quoted above, AusCERT has had no control over its content. The decision to follow or act on information or advice contained in this security bulletin is the responsibility of each user or organisation, and should be considered in accordance with your organisation's site policies and procedures. AusCERT takes no responsibility for consequences which may arise from following or acting on information or advice contained in this security bulletin. NOTE: This is only the original release of the security bulletin. It may not be updated when updates to the original are made. If downloading at a later date, it is recommended that the bulletin is retrieved directly from the author's website to ensure that the information is still current. Contact information for the authors of the original document is included in the Security Bulletin above. If you have any questions or need further information, please contact them directly. Previous advisories and external security bulletins can be retrieved from: https://www.auscert.org.au/bulletins/ =========================================================================== Australian Computer Emergency Response Team The University of Queensland Brisbane Qld 4072 Internet Email: auscert@auscert.org.au Facsimile: (07) 3365 7031 Telephone: (07) 3365 4417 (International: +61 7 3365 4417) AusCERT personnel answer during Queensland business hours which are GMT+10:00 (AEST). On call after hours for member emergencies only. =========================================================================== -----BEGIN PGP SIGNATURE----- Comment: http://www.auscert.org.au/render.html?it=1967 iQIVAwUBXkN/v2aOgq3Tt24GAQg/VhAA07goowD0qcDvmC/zsr2S+b8xbwmw9iMN YBu4vwgtUX0RLlLqbm7SVdMP8G2dTAcdZ9hXcjaEaHXc0oIufbZWOp9TyyUQdVpK /GzI6mCwD17VgBEkQS37LaMg/Wi9eSZMotYjom09RCaplPSqrf3fP282Iyr1gxrq mMItB/dvD5UYhugzakwrOHQHEb32ipH2XpmA6cT3MJlZYhoAs41V9Oy0vIIQZCxT Cpc5tQ7K/asMYF+cTKpdHSnU1krWztORWxH2vE8UCu8ypPr9tMrKkE9lIa8kqhXC hu1NqFn/8vVSz4wc4IQdGTqKjastnHSyWhDj9rhmvJZys3BYkbuG0qJWXoEC//cc wSnnin7ohYzxMhe3RSi1FYIxdXCWW2gJMLnEgdsM+nh4mGFtnklF9Olz8ytSJmLM pBi9aYI1b+wS5WhNXP9EVGxhasRXYHfE//mQjVW21Yo37vR81n2rAv3eSDm0tkWe 2AWAd0GxlUPWFDWl2xKp4tg3nzmZrONW90Y7N7yK6EOEa+6smT+iH0fvFiUOj34b ROa7AvP2W4h4Qf6kM6bd1HlnMcI6rDxZifp49S2stAwHFi9G/smlv87i/5KedptT 1bGkwBZxXB/DcJJU+dr7nb6n1xdDSVenY+yYf6dl/kboRmWOAvTujGT31XXz2xic NRQpL3BlF9E= =Fs3+ -----END PGP SIGNATURE-----