Логотип exploitDog
bind:"CVE-2023-40661" OR bind:"CVE-2023-40660" OR bind:"CVE-2023-4535"
Консоль
Логотип exploitDog

exploitDog

bind:"CVE-2023-40661" OR bind:"CVE-2023-40660" OR bind:"CVE-2023-4535"

Количество 27

Количество 27

oracle-oval логотип

ELSA-2023-7879

около 2 лет назад

ELSA-2023-7879: opensc security update (MODERATE)

EPSS: Низкий
redos логотип

ROS-20240402-21

почти 2 года назад

Множественные уязвимости opensc

CVSS3: 6.6
EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2023:4104-1

около 2 лет назад

Security update for opensc

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2023:4089-1

больше 2 лет назад

Security update for opensc

EPSS: Низкий
oracle-oval логотип

ELSA-2023-7876

около 2 лет назад

ELSA-2023-7876: opensc security update (MODERATE)

EPSS: Низкий
ubuntu логотип

CVE-2023-40661

около 2 лет назад

Several memory vulnerabilities were identified within the OpenSC packages, particularly in the card enrollment process using pkcs15-init when a user or administrator enrolls cards. To take advantage of these flaws, an attacker must have physical access to the computer system and employ a custom-crafted USB device or smart card to manipulate responses to APDUs. This manipulation can potentially allow compromise key generation, certificate loading, and other card management operations during enrollment.

CVSS3: 5.4
EPSS: Низкий
redhat логотип

CVE-2023-40661

больше 2 лет назад

Several memory vulnerabilities were identified within the OpenSC packages, particularly in the card enrollment process using pkcs15-init when a user or administrator enrolls cards. To take advantage of these flaws, an attacker must have physical access to the computer system and employ a custom-crafted USB device or smart card to manipulate responses to APDUs. This manipulation can potentially allow compromise key generation, certificate loading, and other card management operations during enrollment.

CVSS3: 5.4
EPSS: Низкий
nvd логотип

CVE-2023-40661

около 2 лет назад

Several memory vulnerabilities were identified within the OpenSC packages, particularly in the card enrollment process using pkcs15-init when a user or administrator enrolls cards. To take advantage of these flaws, an attacker must have physical access to the computer system and employ a custom-crafted USB device or smart card to manipulate responses to APDUs. This manipulation can potentially allow compromise key generation, certificate loading, and other card management operations during enrollment.

CVSS3: 5.4
EPSS: Низкий
msrc логотип

CVE-2023-40661

больше 1 года назад

CVSS3: 6.4
EPSS: Низкий
debian логотип

CVE-2023-40661

около 2 лет назад

Several memory vulnerabilities were identified within the OpenSC packa ...

CVSS3: 5.4
EPSS: Низкий
github логотип

GHSA-2c2j-2pgv-gfgc

около 2 лет назад

Several memory vulnerabilities were identified within the OpenSC packages, particularly in the card enrollment process using pkcs15-init when a user or administrator enrolls cards. To take advantage of these flaws, an attacker must have physical access to the computer system and employ a custom-crafted USB device or smart card to manipulate responses to APDUs. This manipulation can potentially allow compromise key generation, certificate loading, and other card management operations during enrollment.

CVSS3: 5.4
EPSS: Низкий
fstec логотип

BDU:2024-02588

около 2 лет назад

Уязвимость набора программных инструментов и библиотек для работы со смарт-картами OpenSC, связанная с неправильным ограничением операций в пределах буфера памяти, позволяющая нарушителю оказать воздействие на конфиденциальность, целостность и доступность защищаемой информации

CVSS3: 6.4
EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2023:4065-1

больше 2 лет назад

Security update for opensc

EPSS: Низкий
ubuntu логотип

CVE-2023-4535

около 2 лет назад

An out-of-bounds read vulnerability was found in OpenSC packages within the MyEID driver when handling symmetric key encryption. Exploiting this flaw requires an attacker to have physical access to the computer and a specially crafted USB device or smart card. This flaw allows the attacker to manipulate APDU responses and potentially gain unauthorized access to sensitive data, compromising the system's security.

CVSS3: 4.5
EPSS: Низкий
redhat логотип

CVE-2023-4535

больше 2 лет назад

An out-of-bounds read vulnerability was found in OpenSC packages within the MyEID driver when handling symmetric key encryption. Exploiting this flaw requires an attacker to have physical access to the computer and a specially crafted USB device or smart card. This flaw allows the attacker to manipulate APDU responses and potentially gain unauthorized access to sensitive data, compromising the system's security.

CVSS3: 4.5
EPSS: Низкий
nvd логотип

CVE-2023-4535

около 2 лет назад

An out-of-bounds read vulnerability was found in OpenSC packages within the MyEID driver when handling symmetric key encryption. Exploiting this flaw requires an attacker to have physical access to the computer and a specially crafted USB device or smart card. This flaw allows the attacker to manipulate APDU responses and potentially gain unauthorized access to sensitive data, compromising the system's security.

CVSS3: 4.5
EPSS: Низкий
msrc логотип

CVE-2023-4535

около 2 лет назад

CVSS3: 3.8
EPSS: Низкий
debian логотип

CVE-2023-4535

около 2 лет назад

An out-of-bounds read vulnerability was found in OpenSC packages withi ...

CVSS3: 4.5
EPSS: Низкий
ubuntu логотип

CVE-2023-40660

около 2 лет назад

A flaw was found in OpenSC packages that allow a potential PIN bypass. When a token/card is authenticated by one process, it can perform cryptographic operations in other processes when an empty zero-length pin is passed. This issue poses a security risk, particularly for OS logon/screen unlock and for small, permanently connected tokens to computers. Additionally, the token can internally track login status. This flaw allows an attacker to gain unauthorized access, carry out malicious actions, or compromise the system without the user's awareness.

CVSS3: 6.6
EPSS: Низкий
redhat логотип

CVE-2023-40660

больше 2 лет назад

A flaw was found in OpenSC packages that allow a potential PIN bypass. When a token/card is authenticated by one process, it can perform cryptographic operations in other processes when an empty zero-length pin is passed. This issue poses a security risk, particularly for OS logon/screen unlock and for small, permanently connected tokens to computers. Additionally, the token can internally track login status. This flaw allows an attacker to gain unauthorized access, carry out malicious actions, or compromise the system without the user's awareness.

CVSS3: 6.6
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
oracle-oval логотип
ELSA-2023-7879

ELSA-2023-7879: opensc security update (MODERATE)

около 2 лет назад
redos логотип
ROS-20240402-21

Множественные уязвимости opensc

CVSS3: 6.6
почти 2 года назад
suse-cvrf логотип
SUSE-SU-2023:4104-1

Security update for opensc

около 2 лет назад
suse-cvrf логотип
SUSE-SU-2023:4089-1

Security update for opensc

больше 2 лет назад
oracle-oval логотип
ELSA-2023-7876

ELSA-2023-7876: opensc security update (MODERATE)

около 2 лет назад
ubuntu логотип
CVE-2023-40661

Several memory vulnerabilities were identified within the OpenSC packages, particularly in the card enrollment process using pkcs15-init when a user or administrator enrolls cards. To take advantage of these flaws, an attacker must have physical access to the computer system and employ a custom-crafted USB device or smart card to manipulate responses to APDUs. This manipulation can potentially allow compromise key generation, certificate loading, and other card management operations during enrollment.

CVSS3: 5.4
0%
Низкий
около 2 лет назад
redhat логотип
CVE-2023-40661

Several memory vulnerabilities were identified within the OpenSC packages, particularly in the card enrollment process using pkcs15-init when a user or administrator enrolls cards. To take advantage of these flaws, an attacker must have physical access to the computer system and employ a custom-crafted USB device or smart card to manipulate responses to APDUs. This manipulation can potentially allow compromise key generation, certificate loading, and other card management operations during enrollment.

CVSS3: 5.4
0%
Низкий
больше 2 лет назад
nvd логотип
CVE-2023-40661

Several memory vulnerabilities were identified within the OpenSC packages, particularly in the card enrollment process using pkcs15-init when a user or administrator enrolls cards. To take advantage of these flaws, an attacker must have physical access to the computer system and employ a custom-crafted USB device or smart card to manipulate responses to APDUs. This manipulation can potentially allow compromise key generation, certificate loading, and other card management operations during enrollment.

CVSS3: 5.4
0%
Низкий
около 2 лет назад
msrc логотип
CVSS3: 6.4
0%
Низкий
больше 1 года назад
debian логотип
CVE-2023-40661

Several memory vulnerabilities were identified within the OpenSC packa ...

CVSS3: 5.4
0%
Низкий
около 2 лет назад
github логотип
GHSA-2c2j-2pgv-gfgc

Several memory vulnerabilities were identified within the OpenSC packages, particularly in the card enrollment process using pkcs15-init when a user or administrator enrolls cards. To take advantage of these flaws, an attacker must have physical access to the computer system and employ a custom-crafted USB device or smart card to manipulate responses to APDUs. This manipulation can potentially allow compromise key generation, certificate loading, and other card management operations during enrollment.

CVSS3: 5.4
0%
Низкий
около 2 лет назад
fstec логотип
BDU:2024-02588

Уязвимость набора программных инструментов и библиотек для работы со смарт-картами OpenSC, связанная с неправильным ограничением операций в пределах буфера памяти, позволяющая нарушителю оказать воздействие на конфиденциальность, целостность и доступность защищаемой информации

CVSS3: 6.4
0%
Низкий
около 2 лет назад
suse-cvrf логотип
SUSE-SU-2023:4065-1

Security update for opensc

больше 2 лет назад
ubuntu логотип
CVE-2023-4535

An out-of-bounds read vulnerability was found in OpenSC packages within the MyEID driver when handling symmetric key encryption. Exploiting this flaw requires an attacker to have physical access to the computer and a specially crafted USB device or smart card. This flaw allows the attacker to manipulate APDU responses and potentially gain unauthorized access to sensitive data, compromising the system's security.

CVSS3: 4.5
0%
Низкий
около 2 лет назад
redhat логотип
CVE-2023-4535

An out-of-bounds read vulnerability was found in OpenSC packages within the MyEID driver when handling symmetric key encryption. Exploiting this flaw requires an attacker to have physical access to the computer and a specially crafted USB device or smart card. This flaw allows the attacker to manipulate APDU responses and potentially gain unauthorized access to sensitive data, compromising the system's security.

CVSS3: 4.5
0%
Низкий
больше 2 лет назад
nvd логотип
CVE-2023-4535

An out-of-bounds read vulnerability was found in OpenSC packages within the MyEID driver when handling symmetric key encryption. Exploiting this flaw requires an attacker to have physical access to the computer and a specially crafted USB device or smart card. This flaw allows the attacker to manipulate APDU responses and potentially gain unauthorized access to sensitive data, compromising the system's security.

CVSS3: 4.5
0%
Низкий
около 2 лет назад
msrc логотип
CVSS3: 3.8
0%
Низкий
около 2 лет назад
debian логотип
CVE-2023-4535

An out-of-bounds read vulnerability was found in OpenSC packages withi ...

CVSS3: 4.5
0%
Низкий
около 2 лет назад
ubuntu логотип
CVE-2023-40660

A flaw was found in OpenSC packages that allow a potential PIN bypass. When a token/card is authenticated by one process, it can perform cryptographic operations in other processes when an empty zero-length pin is passed. This issue poses a security risk, particularly for OS logon/screen unlock and for small, permanently connected tokens to computers. Additionally, the token can internally track login status. This flaw allows an attacker to gain unauthorized access, carry out malicious actions, or compromise the system without the user's awareness.

CVSS3: 6.6
0%
Низкий
около 2 лет назад
redhat логотип
CVE-2023-40660

A flaw was found in OpenSC packages that allow a potential PIN bypass. When a token/card is authenticated by one process, it can perform cryptographic operations in other processes when an empty zero-length pin is passed. This issue poses a security risk, particularly for OS logon/screen unlock and for small, permanently connected tokens to computers. Additionally, the token can internally track login status. This flaw allows an attacker to gain unauthorized access, carry out malicious actions, or compromise the system without the user's awareness.

CVSS3: 6.6
0%
Низкий
больше 2 лет назад

Уязвимостей на страницу