Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2023-2977

Опубликовано: 30 мая 2023
Источник: redhat
CVSS3: 6.3
EPSS Низкий

Описание

A vulnerbility was found in OpenSC. This security flaw cause a buffer overrun vulnerability in pkcs15 cardos_have_verifyrc_package. The attacker can supply a smart card package with malformed ASN1 context. The cardos_have_verifyrc_package function scans the ASN1 buffer for 2 tags, where remaining length is wrongly caculated due to moved starting pointer. This leads to possible heap-based buffer oob read. In cases where ASAN is enabled while compiling this causes a crash. Further info leak or more damage is possible.

A vulnerability was found in OpenSC. This issue causes a buffer overrun in the pkcs15 cardos_have_verifyrc_package. This flaw allows an attacker to supply a smart card package with a malformed ASN1 context. The cardos_have_verifyrc_package function scans the ASN1 buffer for two tags, where the remaining length is wrongly calculated due to a moved starting pointer, leading to a possible heap-based buffer out-of-bounds read. In cases where ASN is enabled while compiling, this problem causes a crash, and further information leaks or more damage is likely.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Enterprise Linux 7openscOut of support scope
Red Hat Enterprise Linux 8openscFixedRHSA-2023:716014.11.2023
Red Hat Enterprise Linux 9openscFixedRHSA-2023:658707.11.2023

Показывать по

Дополнительная информация

Статус:

Low
Дефект:
CWE-119
https://bugzilla.redhat.com/show_bug.cgi?id=2211088opensc: buffer overrun vulnerability in pkcs15 cardos_have_verifyrc_package

EPSS

Процентиль: 3%
0.0002
Низкий

6.3 Medium

CVSS3

Связанные уязвимости

CVSS3: 7.1
ubuntu
больше 2 лет назад

A vulnerbility was found in OpenSC. This security flaw cause a buffer overrun vulnerability in pkcs15 cardos_have_verifyrc_package. The attacker can supply a smart card package with malformed ASN1 context. The cardos_have_verifyrc_package function scans the ASN1 buffer for 2 tags, where remaining length is wrongly caculated due to moved starting pointer. This leads to possible heap-based buffer oob read. In cases where ASAN is enabled while compiling this causes a crash. Further info leak or more damage is possible.

CVSS3: 7.1
nvd
больше 2 лет назад

A vulnerbility was found in OpenSC. This security flaw cause a buffer overrun vulnerability in pkcs15 cardos_have_verifyrc_package. The attacker can supply a smart card package with malformed ASN1 context. The cardos_have_verifyrc_package function scans the ASN1 buffer for 2 tags, where remaining length is wrongly caculated due to moved starting pointer. This leads to possible heap-based buffer oob read. In cases where ASAN is enabled while compiling this causes a crash. Further info leak or more damage is possible.

CVSS3: 7.1
msrc
около 2 лет назад

Описание отсутствует

CVSS3: 7.1
debian
больше 2 лет назад

A vulnerbility was found in OpenSC. This security flaw cause a buffer ...

suse-cvrf
около 2 лет назад

Security update for opensc

EPSS

Процентиль: 3%
0.0002
Низкий

6.3 Medium

CVSS3