Логотип exploitDog
bind:"CVE-2023-40661" OR bind:"CVE-2023-40660" OR bind:"CVE-2023-4535"
Консоль
Логотип exploitDog

exploitDog

bind:"CVE-2023-40661" OR bind:"CVE-2023-40660" OR bind:"CVE-2023-4535"

Количество 27

Количество 27

redos логотип

ROS-20240402-21

около 1 года назад

Множественные уязвимости opensc

CVSS3: 6.6
EPSS: Низкий
oracle-oval логотип

ELSA-2023-7879

больше 1 года назад

ELSA-2023-7879: opensc security update (MODERATE)

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2023:4104-1

больше 1 года назад

Security update for opensc

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2023:4089-1

больше 1 года назад

Security update for opensc

EPSS: Низкий
oracle-oval логотип

ELSA-2023-7876

больше 1 года назад

ELSA-2023-7876: opensc security update (MODERATE)

EPSS: Низкий
ubuntu логотип

CVE-2023-40661

больше 1 года назад

Several memory vulnerabilities were identified within the OpenSC packages, particularly in the card enrollment process using pkcs15-init when a user or administrator enrolls cards. To take advantage of these flaws, an attacker must have physical access to the computer system and employ a custom-crafted USB device or smart card to manipulate responses to APDUs. This manipulation can potentially allow compromise key generation, certificate loading, and other card management operations during enrollment.

CVSS3: 5.4
EPSS: Низкий
redhat логотип

CVE-2023-40661

почти 2 года назад

Several memory vulnerabilities were identified within the OpenSC packages, particularly in the card enrollment process using pkcs15-init when a user or administrator enrolls cards. To take advantage of these flaws, an attacker must have physical access to the computer system and employ a custom-crafted USB device or smart card to manipulate responses to APDUs. This manipulation can potentially allow compromise key generation, certificate loading, and other card management operations during enrollment.

CVSS3: 5.4
EPSS: Низкий
nvd логотип

CVE-2023-40661

больше 1 года назад

Several memory vulnerabilities were identified within the OpenSC packages, particularly in the card enrollment process using pkcs15-init when a user or administrator enrolls cards. To take advantage of these flaws, an attacker must have physical access to the computer system and employ a custom-crafted USB device or smart card to manipulate responses to APDUs. This manipulation can potentially allow compromise key generation, certificate loading, and other card management operations during enrollment.

CVSS3: 5.4
EPSS: Низкий
msrc логотип

CVE-2023-40661

12 месяцев назад

CVSS3: 6.4
EPSS: Низкий
debian логотип

CVE-2023-40661

больше 1 года назад

Several memory vulnerabilities were identified within the OpenSC packa ...

CVSS3: 5.4
EPSS: Низкий
github логотип

GHSA-2c2j-2pgv-gfgc

больше 1 года назад

Several memory vulnerabilities were identified within the OpenSC packages, particularly in the card enrollment process using pkcs15-init when a user or administrator enrolls cards. To take advantage of these flaws, an attacker must have physical access to the computer system and employ a custom-crafted USB device or smart card to manipulate responses to APDUs. This manipulation can potentially allow compromise key generation, certificate loading, and other card management operations during enrollment.

CVSS3: 5.4
EPSS: Низкий
fstec логотип

BDU:2024-02588

больше 1 года назад

Уязвимость набора программных инструментов и библиотек для работы со смарт-картами OpenSC, связанная с неправильным ограничением операций в пределах буфера памяти, позволяющая нарушителю оказать воздействие на конфиденциальность, целостность и доступность защищаемой информации

CVSS3: 6.4
EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2023:4065-1

больше 1 года назад

Security update for opensc

EPSS: Низкий
ubuntu логотип

CVE-2023-4535

больше 1 года назад

An out-of-bounds read vulnerability was found in OpenSC packages within the MyEID driver when handling symmetric key encryption. Exploiting this flaw requires an attacker to have physical access to the computer and a specially crafted USB device or smart card. This flaw allows the attacker to manipulate APDU responses and potentially gain unauthorized access to sensitive data, compromising the system's security.

CVSS3: 4.5
EPSS: Низкий
redhat логотип

CVE-2023-4535

почти 2 года назад

An out-of-bounds read vulnerability was found in OpenSC packages within the MyEID driver when handling symmetric key encryption. Exploiting this flaw requires an attacker to have physical access to the computer and a specially crafted USB device or smart card. This flaw allows the attacker to manipulate APDU responses and potentially gain unauthorized access to sensitive data, compromising the system's security.

CVSS3: 4.5
EPSS: Низкий
nvd логотип

CVE-2023-4535

больше 1 года назад

An out-of-bounds read vulnerability was found in OpenSC packages within the MyEID driver when handling symmetric key encryption. Exploiting this flaw requires an attacker to have physical access to the computer and a specially crafted USB device or smart card. This flaw allows the attacker to manipulate APDU responses and potentially gain unauthorized access to sensitive data, compromising the system's security.

CVSS3: 4.5
EPSS: Низкий
msrc логотип

CVE-2023-4535

больше 1 года назад

CVSS3: 3.8
EPSS: Низкий
debian логотип

CVE-2023-4535

больше 1 года назад

An out-of-bounds read vulnerability was found in OpenSC packages withi ...

CVSS3: 4.5
EPSS: Низкий
ubuntu логотип

CVE-2023-40660

больше 1 года назад

A flaw was found in OpenSC packages that allow a potential PIN bypass. When a token/card is authenticated by one process, it can perform cryptographic operations in other processes when an empty zero-length pin is passed. This issue poses a security risk, particularly for OS logon/screen unlock and for small, permanently connected tokens to computers. Additionally, the token can internally track login status. This flaw allows an attacker to gain unauthorized access, carry out malicious actions, or compromise the system without the user's awareness.

CVSS3: 6.6
EPSS: Низкий
redhat логотип

CVE-2023-40660

почти 2 года назад

A flaw was found in OpenSC packages that allow a potential PIN bypass. When a token/card is authenticated by one process, it can perform cryptographic operations in other processes when an empty zero-length pin is passed. This issue poses a security risk, particularly for OS logon/screen unlock and for small, permanently connected tokens to computers. Additionally, the token can internally track login status. This flaw allows an attacker to gain unauthorized access, carry out malicious actions, or compromise the system without the user's awareness.

CVSS3: 6.6
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
redos логотип
ROS-20240402-21

Множественные уязвимости opensc

CVSS3: 6.6
около 1 года назад
oracle-oval логотип
ELSA-2023-7879

ELSA-2023-7879: opensc security update (MODERATE)

больше 1 года назад
suse-cvrf логотип
SUSE-SU-2023:4104-1

Security update for opensc

больше 1 года назад
suse-cvrf логотип
SUSE-SU-2023:4089-1

Security update for opensc

больше 1 года назад
oracle-oval логотип
ELSA-2023-7876

ELSA-2023-7876: opensc security update (MODERATE)

больше 1 года назад
ubuntu логотип
CVE-2023-40661

Several memory vulnerabilities were identified within the OpenSC packages, particularly in the card enrollment process using pkcs15-init when a user or administrator enrolls cards. To take advantage of these flaws, an attacker must have physical access to the computer system and employ a custom-crafted USB device or smart card to manipulate responses to APDUs. This manipulation can potentially allow compromise key generation, certificate loading, and other card management operations during enrollment.

CVSS3: 5.4
0%
Низкий
больше 1 года назад
redhat логотип
CVE-2023-40661

Several memory vulnerabilities were identified within the OpenSC packages, particularly in the card enrollment process using pkcs15-init when a user or administrator enrolls cards. To take advantage of these flaws, an attacker must have physical access to the computer system and employ a custom-crafted USB device or smart card to manipulate responses to APDUs. This manipulation can potentially allow compromise key generation, certificate loading, and other card management operations during enrollment.

CVSS3: 5.4
0%
Низкий
почти 2 года назад
nvd логотип
CVE-2023-40661

Several memory vulnerabilities were identified within the OpenSC packages, particularly in the card enrollment process using pkcs15-init when a user or administrator enrolls cards. To take advantage of these flaws, an attacker must have physical access to the computer system and employ a custom-crafted USB device or smart card to manipulate responses to APDUs. This manipulation can potentially allow compromise key generation, certificate loading, and other card management operations during enrollment.

CVSS3: 5.4
0%
Низкий
больше 1 года назад
msrc логотип
CVSS3: 6.4
0%
Низкий
12 месяцев назад
debian логотип
CVE-2023-40661

Several memory vulnerabilities were identified within the OpenSC packa ...

CVSS3: 5.4
0%
Низкий
больше 1 года назад
github логотип
GHSA-2c2j-2pgv-gfgc

Several memory vulnerabilities were identified within the OpenSC packages, particularly in the card enrollment process using pkcs15-init when a user or administrator enrolls cards. To take advantage of these flaws, an attacker must have physical access to the computer system and employ a custom-crafted USB device or smart card to manipulate responses to APDUs. This manipulation can potentially allow compromise key generation, certificate loading, and other card management operations during enrollment.

CVSS3: 5.4
0%
Низкий
больше 1 года назад
fstec логотип
BDU:2024-02588

Уязвимость набора программных инструментов и библиотек для работы со смарт-картами OpenSC, связанная с неправильным ограничением операций в пределах буфера памяти, позволяющая нарушителю оказать воздействие на конфиденциальность, целостность и доступность защищаемой информации

CVSS3: 6.4
0%
Низкий
больше 1 года назад
suse-cvrf логотип
SUSE-SU-2023:4065-1

Security update for opensc

больше 1 года назад
ubuntu логотип
CVE-2023-4535

An out-of-bounds read vulnerability was found in OpenSC packages within the MyEID driver when handling symmetric key encryption. Exploiting this flaw requires an attacker to have physical access to the computer and a specially crafted USB device or smart card. This flaw allows the attacker to manipulate APDU responses and potentially gain unauthorized access to sensitive data, compromising the system's security.

CVSS3: 4.5
0%
Низкий
больше 1 года назад
redhat логотип
CVE-2023-4535

An out-of-bounds read vulnerability was found in OpenSC packages within the MyEID driver when handling symmetric key encryption. Exploiting this flaw requires an attacker to have physical access to the computer and a specially crafted USB device or smart card. This flaw allows the attacker to manipulate APDU responses and potentially gain unauthorized access to sensitive data, compromising the system's security.

CVSS3: 4.5
0%
Низкий
почти 2 года назад
nvd логотип
CVE-2023-4535

An out-of-bounds read vulnerability was found in OpenSC packages within the MyEID driver when handling symmetric key encryption. Exploiting this flaw requires an attacker to have physical access to the computer and a specially crafted USB device or smart card. This flaw allows the attacker to manipulate APDU responses and potentially gain unauthorized access to sensitive data, compromising the system's security.

CVSS3: 4.5
0%
Низкий
больше 1 года назад
msrc логотип
CVSS3: 3.8
0%
Низкий
больше 1 года назад
debian логотип
CVE-2023-4535

An out-of-bounds read vulnerability was found in OpenSC packages withi ...

CVSS3: 4.5
0%
Низкий
больше 1 года назад
ubuntu логотип
CVE-2023-40660

A flaw was found in OpenSC packages that allow a potential PIN bypass. When a token/card is authenticated by one process, it can perform cryptographic operations in other processes when an empty zero-length pin is passed. This issue poses a security risk, particularly for OS logon/screen unlock and for small, permanently connected tokens to computers. Additionally, the token can internally track login status. This flaw allows an attacker to gain unauthorized access, carry out malicious actions, or compromise the system without the user's awareness.

CVSS3: 6.6
0%
Низкий
больше 1 года назад
redhat логотип
CVE-2023-40660

A flaw was found in OpenSC packages that allow a potential PIN bypass. When a token/card is authenticated by one process, it can perform cryptographic operations in other processes when an empty zero-length pin is passed. This issue poses a security risk, particularly for OS logon/screen unlock and for small, permanently connected tokens to computers. Additionally, the token can internally track login status. This flaw allows an attacker to gain unauthorized access, carry out malicious actions, or compromise the system without the user's awareness.

CVSS3: 6.6
0%
Низкий
почти 2 года назад

Уязвимостей на страницу