Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2024-1454

Опубликовано: 12 фев. 2024
Источник: debian
EPSS Низкий

Описание

The use-after-free vulnerability was found in the AuthentIC driver in OpenSC packages, occuring in the card enrolment process using pkcs15-init when a user or administrator enrols or modifies cards. An attacker must have physical access to the computer system and requires a crafted USB device or smart card to present the system with specially crafted responses to the APDUs, which are considered high complexity and low severity. This manipulation can allow for compromised card management operations during enrolment.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
openscfixed0.25.0~rc1-1package
openscfixed0.23.0-0.3+deb12u2bookwormpackage
openscno-dsabusterpackage

Примечания

  • https://bugzilla.redhat.com/show_bug.cgi?id=2263929

  • https://github.com/OpenSC/OpenSC/wiki/CVE-2024-1454

  • Fixed by: https://github.com/OpenSC/OpenSC/commit/5835f0d4f6c033bd58806d33fa546908d39825c9

EPSS

Процентиль: 24%
0.00079
Низкий

Связанные уязвимости

CVSS3: 3.4
ubuntu
почти 2 года назад

The use-after-free vulnerability was found in the AuthentIC driver in OpenSC packages, occuring in the card enrolment process using pkcs15-init when a user or administrator enrols or modifies cards. An attacker must have physical access to the computer system and requires a crafted USB device or smart card to present the system with specially crafted responses to the APDUs, which are considered high complexity and low severity. This manipulation can allow for compromised card management operations during enrolment.

CVSS3: 3.4
redhat
почти 2 года назад

The use-after-free vulnerability was found in the AuthentIC driver in OpenSC packages, occuring in the card enrolment process using pkcs15-init when a user or administrator enrols or modifies cards. An attacker must have physical access to the computer system and requires a crafted USB device or smart card to present the system with specially crafted responses to the APDUs, which are considered high complexity and low severity. This manipulation can allow for compromised card management operations during enrolment.

CVSS3: 3.4
nvd
почти 2 года назад

The use-after-free vulnerability was found in the AuthentIC driver in OpenSC packages, occuring in the card enrolment process using pkcs15-init when a user or administrator enrols or modifies cards. An attacker must have physical access to the computer system and requires a crafted USB device or smart card to present the system with specially crafted responses to the APDUs, which are considered high complexity and low severity. This manipulation can allow for compromised card management operations during enrolment.

CVSS3: 3.4
msrc
11 месяцев назад

Описание отсутствует

CVSS3: 3.4
github
почти 2 года назад

The use-after-free vulnerability was found in the AuthentIC driver in OpenSC packages, occuring in the card enrolment process using pkcs15-init when a user or administrator enrols or modifies cards. An attacker must have physical access to the computer system and requires a crafted USB device or smart card to present the system with specially crafted responses to the APDUs, which are considered high complexity and low severity. This manipulation can allow for compromised card management operations during enrolment.

EPSS

Процентиль: 24%
0.00079
Низкий
Уязвимость CVE-2024-1454