Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2024-1454

Опубликовано: 12 фев. 2024
Источник: ubuntu
Приоритет: medium
EPSS Низкий
CVSS3: 3.4

Описание

The use-after-free vulnerability was found in the AuthentIC driver in OpenSC packages, occuring in the card enrolment process using pkcs15-init when a user or administrator enrols or modifies cards. An attacker must have physical access to the computer system and requires a crafted USB device or smart card to present the system with specially crafted responses to the APDUs, which are considered high complexity and low severity. This manipulation can allow for compromised card management operations during enrolment.

РелизСтатусПримечание
bionic

ignored

end of standard support
devel

not-affected

esm-apps/bionic

not-affected

code not present
esm-apps/focal

not-affected

code not present
esm-apps/jammy

not-affected

code not present
esm-apps/noble

not-affected

esm-apps/xenial

not-affected

code not present
focal

not-affected

code not present
jammy

not-affected

code not present
mantic

ignored

end of life, was needed

Показывать по

EPSS

Процентиль: 19%
0.00061
Низкий

3.4 Low

CVSS3

Связанные уязвимости

CVSS3: 3.4
redhat
больше 1 года назад

The use-after-free vulnerability was found in the AuthentIC driver in OpenSC packages, occuring in the card enrolment process using pkcs15-init when a user or administrator enrols or modifies cards. An attacker must have physical access to the computer system and requires a crafted USB device or smart card to present the system with specially crafted responses to the APDUs, which are considered high complexity and low severity. This manipulation can allow for compromised card management operations during enrolment.

CVSS3: 3.4
nvd
больше 1 года назад

The use-after-free vulnerability was found in the AuthentIC driver in OpenSC packages, occuring in the card enrolment process using pkcs15-init when a user or administrator enrols or modifies cards. An attacker must have physical access to the computer system and requires a crafted USB device or smart card to present the system with specially crafted responses to the APDUs, which are considered high complexity and low severity. This manipulation can allow for compromised card management operations during enrolment.

CVSS3: 3.4
msrc
4 месяца назад

Описание отсутствует

CVSS3: 3.4
debian
больше 1 года назад

The use-after-free vulnerability was found in the AuthentIC driver in ...

CVSS3: 4.5
redos
около 1 года назад

Уязвимость opensc

EPSS

Процентиль: 19%
0.00061
Низкий

3.4 Low

CVSS3