Page 5 of 49 results (0.011 seconds)

CVSS: 4.3EPSS: 0%CPEs: 1EXPL: 0

04 Sep 2018 — Various out of bounds reads when handling responses in OpenSC before 0.19.0-rc1 could be used by attackers able to supply crafted smartcards to potentially crash the opensc library using programs. Varias lecturas fuera de límites al manejar las respuestas en OpenSC en versiones anteriores a la 0.19.0-rc1 podrían ser empleadas por los atacantes para proporcionar smartcards para provocar el cierre inesperado de la librería opensc mediante programas. The OpenSC set of libraries and utilities provides support f... • https://access.redhat.com/errata/RHSA-2019:2154 • CWE-120: Buffer Copy without Checking Size of Input ('Classic Buffer Overflow') CWE-125: Out-of-bounds Read •

CVSS: 6.8EPSS: 0%CPEs: 1EXPL: 1

03 Sep 2018 — Several buffer overflows when handling responses from a Muscle Card in muscle_list_files in libopensc/card-muscle.c in OpenSC before 0.19.0-rc1 could be used by attackers able to supply crafted smartcards to cause a denial of service (application crash) or possibly have unspecified other impact. Varios desbordamientos de búfer al manejar las respuestas de una Muscle Card en muscle_list_files en libopensc/card-muscle.c en OpenSC en versiones anteriores a la 0.19.0-rc1 podrían ser empleados por atacantes para... • https://access.redhat.com/errata/RHSA-2019:2154 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer CWE-120: Buffer Copy without Checking Size of Input ('Classic Buffer Overflow') •

CVSS: 6.8EPSS: 0%CPEs: 1EXPL: 1

03 Sep 2018 — Several buffer overflows when handling responses from a TCOS Card in tcos_select_file in libopensc/card-tcos.c in OpenSC before 0.19.0-rc1 could be used by attackers able to supply crafted smartcards to cause a denial of service (application crash) or possibly have unspecified other impact. Varios desbordamientos de búfer al manejar las respuestas de una TCOS Card en tcos_select_file en libopensc/card-tcos.c en OpenSC en versiones anteriores a la 0.19.0-rc1 podrían ser empleados por atacantes para proporcio... • https://access.redhat.com/errata/RHSA-2019:2154 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer CWE-120: Buffer Copy without Checking Size of Input ('Classic Buffer Overflow') •

CVSS: 6.8EPSS: 0%CPEs: 1EXPL: 1

03 Sep 2018 — Several buffer overflows when handling responses from a Gemsafe V1 Smartcard in gemsafe_get_cert_len in libopensc/pkcs15-gemsafeV1.c in OpenSC before 0.19.0-rc1 could be used by attackers able to supply crafted smartcards to cause a denial of service (application crash) or possibly have unspecified other impact. Varios desbordamientos de búfer al manejar las respuestas de una Smartcard Gemsafe V1 en gemsafe_get_cert_len en libopensc/pkcs15-gemsafeV1.c en OpenSC en versiones anteriores a la 0.19.0-rc1 podría... • https://access.redhat.com/errata/RHSA-2019:2154 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer CWE-120: Buffer Copy without Checking Size of Input ('Classic Buffer Overflow') •

CVSS: 7.2EPSS: 0%CPEs: 38EXPL: 5

07 Jan 2011 — Multiple stack-based buffer overflows in libopensc in OpenSC 0.11.13 and earlier allow physically proximate attackers to execute arbitrary code via a long serial-number field on a smart card, related to (1) card-acos5.c, (2) card-atrust-acos.c, and (3) card-starcos.c. Múltiples desbordamientos de búfer basado en pila en libopensc en OpenSC v0.11.13 y anteriores permite a atacantes físicamente próximos ejecutar código arbitrario a través de un campo largo serial-number de una tarjeta inteligente, relacionado... • http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=607427 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •

CVSS: 7.5EPSS: 1%CPEs: 4EXPL: 0

11 May 2009 — src/tools/pkcs11-tool.c in pkcs11-tool in OpenSC 0.11.7, when used with unspecified third-party PKCS#11 modules, generates RSA keys with incorrect public exponents, which allows attackers to read the cleartext form of messages that were intended to be encrypted. Vulnerabilidad en src/tools/pkcs11-tool.c en pkcs11-tool de OpenSC v0.11.7. Cuando se utiliza con modulos PKCS#11 de terceras partes sin especificar, genera claves RSA con exponentes públicos incorrectos, lo que permite a usuarios remotos leer en te... • http://secunia.com/advisories/35035 • CWE-312: Cleartext Storage of Sensitive Information •

CVSS: 4.6EPSS: 0%CPEs: 31EXPL: 2

02 Mar 2009 — OpenSC before 0.11.7 allows physically proximate attackers to bypass intended PIN requirements and read private data objects via a (1) low level APDU command or (2) debugging tool, as demonstrated by reading the 4601 or 4701 file with the opensc-explorer or opensc-tool program. Vulnerabilidad en OpenSC en versiones anteriores a v0.11.7 que permite a atacantes próximos físicamente evitar los requisitos de autenticación/validación de PIN a través de (1) el comando APDU de bajo nivel o (2) una herramienta de d... • https://www.exploit-db.com/exploits/32820 • CWE-310: Cryptographic Issues •

CVSS: 6.6EPSS: 0%CPEs: 22EXPL: 0

10 Sep 2008 — pkcs15-tool in OpenSC before 0.11.6 does not apply security updates to a smart card unless the card's label matches the "OpenSC" string, which might allow physically proximate attackers to exploit vulnerabilities that the card owner expected were patched, as demonstrated by exploitation of CVE-2008-2235. pkcs15-tool en OpenSC antes de 0.11.6 no aplica las actualizaciones de seguridad a una tarjeta inteligente a menos que la etiqueta de la tarjeta corresponda con la cadena "OpenSC", lo que podría permitir a ... • http://lists.opensuse.org/opensuse-security-announce/2008-09/msg00005.html • CWE-264: Permissions, Privileges, and Access Controls •

CVSS: 6.1EPSS: 0%CPEs: 22EXPL: 0

01 Aug 2008 — OpenSC before 0.11.5 uses weak permissions (ADMIN file control information of 00) for the 5015 directory on smart cards and USB crypto tokens running Siemens CardOS M4, which allows physically proximate attackers to change the PIN. OpenSC anterior a 0.11.5 usa permisos débiles (archivo de control de información ADMIN de 00) para el directorio 5015 en smart cards y crypto tokens USB ejecutándose Siemens CardOS M4, que permite a atacantes próximos físicamente cambiar el PIN. • http://lists.opensuse.org/opensuse-security-announce/2008-09/msg00005.html • CWE-310: Cryptographic Issues •