Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2020-26572

Опубликовано: 06 окт. 2020
Источник: redhat
CVSS3: 6.4

Описание

The TCOS smart card software driver in OpenSC before 0.21.0-rc1 has a stack-based buffer overflow in tcos_decipher.

Меры по смягчению последствий

This flaw can be mitigated in cases where you can use opensc without the TCOS driver enabled. In such cases, the vulnerable driver can be disabled by specifying them in /etc/opensc.conf card_drivers field in allowlist fashion. One such example:

app default { card_drivers = cac, cac1, PIV-II; }

This would only enable the cac, cac1, and PIV-II smart card drivers, and all others would be disabled, including the TCOS driver. With the TCOS driver disabled, this flaw is mitigated. It is important to list all drivers that you need in the card_drivers field so that they are not disabled too.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Enterprise Linux 7openscOut of support scope
Red Hat Enterprise Linux 8openscFixedRHSA-2021:160018.05.2021

Показывать по

Дополнительная информация

Статус:

Moderate
Дефект:
CWE-121->CWE-787
https://bugzilla.redhat.com/show_bug.cgi?id=1885954opensc: stack-based buffer overflow in tcos_decipher

6.4 Medium

CVSS3

Связанные уязвимости

CVSS3: 5.5
ubuntu
больше 4 лет назад

The TCOS smart card software driver in OpenSC before 0.21.0-rc1 has a stack-based buffer overflow in tcos_decipher.

CVSS3: 5.5
nvd
больше 4 лет назад

The TCOS smart card software driver in OpenSC before 0.21.0-rc1 has a stack-based buffer overflow in tcos_decipher.

CVSS3: 5.5
msrc
больше 3 лет назад

Описание отсутствует

CVSS3: 5.5
debian
больше 4 лет назад

The TCOS smart card software driver in OpenSC before 0.21.0-rc1 has a ...

github
около 3 лет назад

The TCOS smart card software driver in OpenSC before 0.21.0-rc1 has a stack-based buffer overflow in tcos_decipher.

6.4 Medium

CVSS3