Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2019-16058

Опубликовано: 06 сент. 2019
Источник: ubuntu
Приоритет: low
EPSS Низкий
CVSS2: 5
CVSS3: 7.5

Описание

An issue was discovered in the pam_p11 component 0.2.0 and 0.3.0 for OpenSC. If a smart card creates a signature with a length longer than 256 bytes, this triggers a buffer overflow. This may be the case for RSA keys with 4096 bits depending on the signature scheme.

РелизСтатусПримечание
bionic

ignored

end of standard support, was needs-triage
devel

not-affected

0.3.1-1
disco

ignored

end of life
eoan

ignored

end of life
esm-infra-legacy/trusty

needs-triage

esm-infra/bionic

needs-triage

esm-infra/focal

not-affected

0.3.1-1
esm-infra/xenial

needs-triage

focal

not-affected

0.3.1-1
groovy

not-affected

0.3.1-1

Показывать по

Ссылки на источники

EPSS

Процентиль: 57%
0.00354
Низкий

5 Medium

CVSS2

7.5 High

CVSS3

Связанные уязвимости

CVSS3: 7.5
nvd
больше 6 лет назад

An issue was discovered in the pam_p11 component 0.2.0 and 0.3.0 for OpenSC. If a smart card creates a signature with a length longer than 256 bytes, this triggers a buffer overflow. This may be the case for RSA keys with 4096 bits depending on the signature scheme.

CVSS3: 7.5
debian
больше 6 лет назад

An issue was discovered in the pam_p11 component 0.2.0 and 0.3.0 for O ...

CVSS3: 7.5
github
больше 3 лет назад

An issue was discovered in the pam_p11 component 0.2.0 and 0.3.0 for OpenSC. If a smart card creates a signature with a length longer than 256 bytes, this triggers a buffer overflow. This may be the case for RSA keys with 4096 bits depending on the signature scheme.

EPSS

Процентиль: 57%
0.00354
Низкий

5 Medium

CVSS2

7.5 High

CVSS3