Логотип exploitDog
bind:"BDU:2024-03243" OR bind:"CVE-2024-1454"
Консоль
Логотип exploitDog

exploitDog

bind:"BDU:2024-03243" OR bind:"CVE-2024-1454"

Количество 8

Количество 8

fstec логотип

BDU:2024-03243

почти 2 года назад

Уязвимость драйвера AuthentIC набора программных инструментов и библиотек для работы со смарт-картами OpenSC, позволяющая нарушителю позволить скомпрометировать операции по управлению картами

CVSS3: 4.5
EPSS: Низкий
ubuntu логотип

CVE-2024-1454

почти 2 года назад

The use-after-free vulnerability was found in the AuthentIC driver in OpenSC packages, occuring in the card enrolment process using pkcs15-init when a user or administrator enrols or modifies cards. An attacker must have physical access to the computer system and requires a crafted USB device or smart card to present the system with specially crafted responses to the APDUs, which are considered high complexity and low severity. This manipulation can allow for compromised card management operations during enrolment.

CVSS3: 3.4
EPSS: Низкий
redhat логотип

CVE-2024-1454

почти 2 года назад

The use-after-free vulnerability was found in the AuthentIC driver in OpenSC packages, occuring in the card enrolment process using pkcs15-init when a user or administrator enrols or modifies cards. An attacker must have physical access to the computer system and requires a crafted USB device or smart card to present the system with specially crafted responses to the APDUs, which are considered high complexity and low severity. This manipulation can allow for compromised card management operations during enrolment.

CVSS3: 3.4
EPSS: Низкий
nvd логотип

CVE-2024-1454

почти 2 года назад

The use-after-free vulnerability was found in the AuthentIC driver in OpenSC packages, occuring in the card enrolment process using pkcs15-init when a user or administrator enrols or modifies cards. An attacker must have physical access to the computer system and requires a crafted USB device or smart card to present the system with specially crafted responses to the APDUs, which are considered high complexity and low severity. This manipulation can allow for compromised card management operations during enrolment.

CVSS3: 3.4
EPSS: Низкий
msrc логотип

CVE-2024-1454

9 месяцев назад

CVSS3: 3.4
EPSS: Низкий
debian логотип

CVE-2024-1454

почти 2 года назад

The use-after-free vulnerability was found in the AuthentIC driver in ...

CVSS3: 3.4
EPSS: Низкий
redos логотип

ROS-20240422-01

больше 1 года назад

Уязвимость opensc

CVSS3: 4.5
EPSS: Низкий
github логотип

GHSA-6q4q-mhg5-v6xh

почти 2 года назад

The use-after-free vulnerability was found in the AuthentIC driver in OpenSC packages, occuring in the card enrolment process using pkcs15-init when a user or administrator enrols or modifies cards. An attacker must have physical access to the computer system and requires a crafted USB device or smart card to present the system with specially crafted responses to the APDUs, which are considered high complexity and low severity. This manipulation can allow for compromised card management operations during enrolment.

CVSS3: 3.4
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
fstec логотип
BDU:2024-03243

Уязвимость драйвера AuthentIC набора программных инструментов и библиотек для работы со смарт-картами OpenSC, позволяющая нарушителю позволить скомпрометировать операции по управлению картами

CVSS3: 4.5
0%
Низкий
почти 2 года назад
ubuntu логотип
CVE-2024-1454

The use-after-free vulnerability was found in the AuthentIC driver in OpenSC packages, occuring in the card enrolment process using pkcs15-init when a user or administrator enrols or modifies cards. An attacker must have physical access to the computer system and requires a crafted USB device or smart card to present the system with specially crafted responses to the APDUs, which are considered high complexity and low severity. This manipulation can allow for compromised card management operations during enrolment.

CVSS3: 3.4
0%
Низкий
почти 2 года назад
redhat логотип
CVE-2024-1454

The use-after-free vulnerability was found in the AuthentIC driver in OpenSC packages, occuring in the card enrolment process using pkcs15-init when a user or administrator enrols or modifies cards. An attacker must have physical access to the computer system and requires a crafted USB device or smart card to present the system with specially crafted responses to the APDUs, which are considered high complexity and low severity. This manipulation can allow for compromised card management operations during enrolment.

CVSS3: 3.4
0%
Низкий
почти 2 года назад
nvd логотип
CVE-2024-1454

The use-after-free vulnerability was found in the AuthentIC driver in OpenSC packages, occuring in the card enrolment process using pkcs15-init when a user or administrator enrols or modifies cards. An attacker must have physical access to the computer system and requires a crafted USB device or smart card to present the system with specially crafted responses to the APDUs, which are considered high complexity and low severity. This manipulation can allow for compromised card management operations during enrolment.

CVSS3: 3.4
0%
Низкий
почти 2 года назад
msrc логотип
CVSS3: 3.4
0%
Низкий
9 месяцев назад
debian логотип
CVE-2024-1454

The use-after-free vulnerability was found in the AuthentIC driver in ...

CVSS3: 3.4
0%
Низкий
почти 2 года назад
redos логотип
ROS-20240422-01

Уязвимость opensc

CVSS3: 4.5
0%
Низкий
больше 1 года назад
github логотип
GHSA-6q4q-mhg5-v6xh

The use-after-free vulnerability was found in the AuthentIC driver in OpenSC packages, occuring in the card enrolment process using pkcs15-init when a user or administrator enrols or modifies cards. An attacker must have physical access to the computer system and requires a crafted USB device or smart card to present the system with specially crafted responses to the APDUs, which are considered high complexity and low severity. This manipulation can allow for compromised card management operations during enrolment.

CVSS3: 3.4
0%
Низкий
почти 2 года назад

Уязвимостей на страницу