Skip to content

Buffer overflow in deprecated USB HALs and stack overflow in USB enumeration

Low
bryan-hunt published GHSA-f366-4rvv-95x2 Sep 14, 2020

Package

cryptoauthlib

Affected versions

<= v3.2.2

Patched versions

v3.2.3

Description

Impact

  1. If an application is making use of the deprecated kit protocol HALs as the communication channel to the target device an attacker can masquerade as a device and return malformed packets of arbitrary length which the protocol stack will write to the stack. HALs intended for production use are unaffected (I2C, SWI, & SPI) as well as the hidapi HAL (hal_all_platforms_kit_hidapi.c).

  2. The hidapi HAL can be made to overrun the application stack by attaching more than 10 (real or virtual) devices likely resulting in an application crash as this does not allow arbitrary data to be written to the stack.

Patches

USB kit enumeration has been patched in v3.2.3 for the hidapi HAL (hal_all_platforms_kit_hidapi.c).

Removal of deprecated HALs

Deprecated usb kit HALs have been removed in v3.2.3.

Workarounds

This vulnerability is limited to users of the kit protocol which is used with Microchip kits and kit firmware to bridge communication from USB-HID to I2C or SWI. It is not expected that kits would be used in an production environment. This is an optional component for users as well so they can always compile the library without the usb support option.

Special python packaging notes

The python package for cryptoauthlib uses date codes for identifying versions. The patched version for python packages is 20200912

References

Please see Microchip PSIRT for Microchip's security policy and reporting procedures

Credits

Special thanks to Ruben Santamarta of IOActive for reporting

Severity

Low

CVE ID

No known CVE

Weaknesses

No CWEs