Canary Mail and MailCore2 library missing certificate validation check on IMAP STARTTLS
CENSUS ID: | CENSUS-2021-0001 |
CVE ID: | CVE-2021-26911 |
Affected Products: | Canary Mail for iOS and MacOS versions 3.20 and 3.21, MailCore2 library version 0.6.4 |
Class: | Improper Certificate Validation (CWE-295) |
Discovered by: | Rayd Debbas |
CENSUS identified that the Canary Mail software in versions 3.20 and 3.21 (and possibly previous versions) is missing a certificate validation check when performing an IMAP connection configured with STARTTLS. This vulnerability allows man-in-the-middle attackers to collect a victim user's email credentials (while these are communicated to the IMAP service), to access email messages and perform other IMAP actions to the victim account, but also to modify email messages while in-transit to Canary Mail. CENSUS strongly recommends to iOS and MacOS users of the Canary Mail software to update to version 3.22, as this version carries a fix for the aforementioned vulnerability. The same vulnerability also affects other software that are based on the MailCore2 library (including version 0.6.4). A patch for the library is publicly available, however this has not been incorporated yet into an official library release.
Microchip cryptoauthlib atcab_sign_base buffer overflow
CENSUS ID: | CENSUS-2020-0003 |
CVE ID: | CVE-2019-16128 |
Affected Products: | cryptoauthlib versions prior to "20191122" |
Class: | Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')(CWE-120) |
Discovered by: | George Poulios |
CENSUS identified a buffer overflow vulnerability in the atcab_sign_base function of the cryptoauthlib library. This library is part of the standard SDK provided by Microchip and is used to drive the operation of cryptographic co-processors sold by the vendor, such as the ATECC608A. An attacker with physical access to an embedded device where a microcontroller unit executes a vulnerable version of this library, may be able to execute arbitrary code on the microcontroller, by supplying malicious input to the microcontroller. Affected manufacturers of embedded systems that use Microchip cryptographic co-processors, are strongly recommended to update to at least version "20191122" of the "cryptoauthlib" library.
Microchip cryptoauthlib atcab_genkey_base buffer overflow
CENSUS ID: | CENSUS-2020-0004 |
CVE ID: | CVE-2019-16129 |
Affected Products: | cryptoauthlib versions prior to "20191122" |
Class: | Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')(CWE-120) |
Discovered by: | George Poulios |
CENSUS identified a buffer overflow vulnerability in the atcab_genkey_base function of the cryptoauthlib library. This library is part of the standard SDK provided by Microchip and is used to drive the operation of cryptographic co-processors sold by the vendor, such as the ATECC608A. An attacker with physical access to an embedded device where a microcontroller unit executes a vulnerable version of this library, may be able to execute arbitrary code on the microcontroller, by supplying malicious input to the microcontroller. Affected manufacturers of embedded systems that use Microchip cryptographic co-processors, are strongly recommended to update to at least version "20191122" of the "cryptoauthlib" library.
Microchip ASF4 integer overflows in flash_read, flash_write and flash_append
CENSUS ID: | CENSUS-2020-0005 |
CVE ID: | CVE-2019-16127 |
Affected Products: | ASF4 as distributed through start.atmel.com (last accessed 2020-10-21) |
Class: | Integer Overflow or Wraparound (CWE-190) |
Discovered by: | George Poulios |
CENSUS identified several integer overflow problems in the flash_read, flash_write and flash_append functions of the Microchip ASF4 framework. This framework is used during firmware development for Atmel (now Microchip) microcontrollers. An adversary may abuse these issues to gain unauthorized read or write access to arbitrary pages of the flash storage, especially pages mapped at low memory addresses. As no patch is available from the vendor, CENSUS urges developers to implement a check for integer overflows in the relevant code.