Security
Headlines
HeadlinesLatestCVEs

Headline

CVE-2023-49208: Check key length before parsing it in FIDO2 attestation registration · babelouest/glewlwyd@f9d8c06

scheme/webauthn.c in Glewlwyd SSO server before 2.7.6 has a possible buffer overflow during FIDO2 credentials validation in webauthn registration.

CVE
#web#js#buffer_overflow#auth

Expand Up @@ -2299,13 +2299,13 @@ static json_t * register_new_attestation(struct config_module * config, json_t * for (i=0; i<cbor_map_size(cbor_cose); i++) { cbor_key = cbor_map_handle(cbor_cose)[i].key; cbor_value = cbor_map_handle(cbor_cose)[i].value; if (cbor_isa_negint(cbor_key) && cbor_get_int(cbor_key) == 1 && cbor_isa_bytestring(cbor_value)) { if (cbor_isa_negint(cbor_key) && cbor_get_int(cbor_key) == 1 && cbor_isa_bytestring(cbor_value) && cbor_bytestring_length(cbor_value) <= 256) { has_x = 1; memcpy(cert_x, cbor_bytestring_handle(cbor_value), cbor_bytestring_length(cbor_value)); cert_x_len = cbor_bytestring_length(cbor_value); g_x.data = cert_x; g_x.size = (unsigned int)cbor_bytestring_length(cbor_value); } else if (cbor_isa_negint(cbor_key) && cbor_get_int(cbor_key) == 2 && cbor_isa_bytestring(cbor_value)) { } else if (cbor_isa_negint(cbor_key) && cbor_get_int(cbor_key) == 2 && cbor_isa_bytestring(cbor_value) && cbor_bytestring_length(cbor_value) <= 256) { has_y = 1; memcpy(cert_y, cbor_bytestring_handle(cbor_value), cbor_bytestring_length(cbor_value)); cert_y_len = cbor_bytestring_length(cbor_value); Expand Down

CVE: Latest News

CVE-2023-50976: Transactions API Authorization by oleiman · Pull Request #14969 · redpanda-data/redpanda
CVE-2023-6905
CVE-2023-6903
CVE-2023-6904
CVE-2023-3907