Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2025-49010

Опубликовано: 30 мар. 2026
Источник: debian
EPSS Низкий

Описание

OpenSC is an open source smart card tools and middleware. Prior to version 0.27.0, an attacker with physical access to the computer at the time user or administrator uses a token can cause a stack-buffer-overflow write in GET RESPONSE. The attack requires crafted USB device or smart card that would present the system with specially crafted responses to the APDUs. This issue has been patched in version 0.27.0.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
openscfixed0.27.0~rc1-1package
openscno-dsatrixiepackage
openscno-dsabookwormpackage

Примечания

  • https://github.com/OpenSC/OpenSC/security/advisories/GHSA-q5cf-5wmx-9wh4

  • https://github.com/OpenSC/OpenSC/wiki/CVE-2025-49010

  • Fixed by: https://github.com/OpenSC/OpenSC/commit/953986f65db61871bbbff72788d861d67d5140c6 (0.27.0-rc1)

EPSS

Процентиль: 5%
0.00019
Низкий

Связанные уязвимости

CVSS3: 3.8
ubuntu
3 дня назад

OpenSC is an open source smart card tools and middleware. Prior to version 0.27.0, an attacker with physical access to the computer at the time user or administrator uses a token can cause a stack-buffer-overflow write in GET RESPONSE. The attack requires crafted USB device or smart card that would present the system with specially crafted responses to the APDUs. This issue has been patched in version 0.27.0.

CVSS3: 3.8
redhat
3 дня назад

OpenSC is an open source smart card tools and middleware. Prior to version 0.27.0, an attacker with physical access to the computer at the time user or administrator uses a token can cause a stack-buffer-overflow write in GET RESPONSE. The attack requires crafted USB device or smart card that would present the system with specially crafted responses to the APDUs. This issue has been patched in version 0.27.0.

CVSS3: 3.8
nvd
3 дня назад

OpenSC is an open source smart card tools and middleware. Prior to version 0.27.0, an attacker with physical access to the computer at the time user or administrator uses a token can cause a stack-buffer-overflow write in GET RESPONSE. The attack requires crafted USB device or smart card that would present the system with specially crafted responses to the APDUs. This issue has been patched in version 0.27.0.

msrc
2 дня назад

OpenSC: Stack-buffer-overflow WRITE in GET RESPONSE

EPSS

Процентиль: 5%
0.00019
Низкий