Описание
Several buffer overflows when handling responses from a CAC Card in cac_get_serial_nr_from_CUID in libopensc/card-cac.c in OpenSC before 0.19.0-rc1 could be used by attackers able to supply crafted smartcards to cause a denial of service (application crash) or possibly have unspecified other impact.
Ссылки
- PatchThird Party Advisory
- PatchRelease NotesThird Party Advisory
- ExploitThird Party Advisory
- PatchThird Party Advisory
- PatchRelease NotesThird Party Advisory
- ExploitThird Party Advisory
Уязвимые конфигурации
EPSS
6.6 Medium
CVSS3
4.6 Medium
CVSS2
Дефекты
Связанные уязвимости
Several buffer overflows when handling responses from a CAC Card in cac_get_serial_nr_from_CUID in libopensc/card-cac.c in OpenSC before 0.19.0-rc1 could be used by attackers able to supply crafted smartcards to cause a denial of service (application crash) or possibly have unspecified other impact.
Several buffer overflows when handling responses from a CAC Card in cac_get_serial_nr_from_CUID in libopensc/card-cac.c in OpenSC before 0.19.0-rc1 could be used by attackers able to supply crafted smartcards to cause a denial of service (application crash) or possibly have unspecified other impact.
Several buffer overflows when handling responses from a CAC Card in ca ...
Several buffer overflows when handling responses from a CAC Card in cac_get_serial_nr_from_CUID in libopensc/card-cac.c in OpenSC before 0.19.0-rc1 could be used by attackers able to supply crafted smartcards to cause a denial of service (application crash) or possibly have unspecified other impact.
ELSA-2019-2154: opensc security, bug fix, and enhancement update (MODERATE)
EPSS
6.6 Medium
CVSS3
4.6 Medium
CVSS2