Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2023-2977

Опубликовано: 01 июн. 2023
Источник: ubuntu
Приоритет: medium
EPSS Низкий
CVSS3: 7.1

Описание

A vulnerbility was found in OpenSC. This security flaw cause a buffer overrun vulnerability in pkcs15 cardos_have_verifyrc_package. The attacker can supply a smart card package with malformed ASN1 context. The cardos_have_verifyrc_package function scans the ASN1 buffer for 2 tags, where remaining length is wrongly caculated due to moved starting pointer. This leads to possible heap-based buffer oob read. In cases where ASAN is enabled while compiling this causes a crash. Further info leak or more damage is possible.

РелизСтатусПримечание
bionic

ignored

end of standard support
devel

not-affected

esm-apps/bionic

released

0.17.0-3ubuntu0.1~esm2
esm-apps/focal

released

0.20.0-3ubuntu0.1~esm4
esm-apps/jammy

released

0.22.0-1ubuntu2+esm1
esm-apps/noble

not-affected

esm-apps/xenial

released

0.15.0-1ubuntu1+esm2
focal

ignored

end of standard support, was needed
jammy

needed

kinetic

ignored

end of life, was needs-triage

Показывать по

EPSS

Процентиль: 3%
0.0002
Низкий

7.1 High

CVSS3

Связанные уязвимости

CVSS3: 6.3
redhat
больше 2 лет назад

A vulnerbility was found in OpenSC. This security flaw cause a buffer overrun vulnerability in pkcs15 cardos_have_verifyrc_package. The attacker can supply a smart card package with malformed ASN1 context. The cardos_have_verifyrc_package function scans the ASN1 buffer for 2 tags, where remaining length is wrongly caculated due to moved starting pointer. This leads to possible heap-based buffer oob read. In cases where ASAN is enabled while compiling this causes a crash. Further info leak or more damage is possible.

CVSS3: 7.1
nvd
больше 2 лет назад

A vulnerbility was found in OpenSC. This security flaw cause a buffer overrun vulnerability in pkcs15 cardos_have_verifyrc_package. The attacker can supply a smart card package with malformed ASN1 context. The cardos_have_verifyrc_package function scans the ASN1 buffer for 2 tags, where remaining length is wrongly caculated due to moved starting pointer. This leads to possible heap-based buffer oob read. In cases where ASAN is enabled while compiling this causes a crash. Further info leak or more damage is possible.

CVSS3: 7.1
msrc
около 2 лет назад

Описание отсутствует

CVSS3: 7.1
debian
больше 2 лет назад

A vulnerbility was found in OpenSC. This security flaw cause a buffer ...

suse-cvrf
около 2 лет назад

Security update for opensc

EPSS

Процентиль: 3%
0.0002
Низкий

7.1 High

CVSS3