Several buffer overflows when handling responses from a Cryptoflex card in read_public_key in tools/cryptoflex-tool.c in OpenSC before 0.19.0-rc1 could be used by attackers able to supply crafted smartcards to cause a denial of service (application crash) or possibly have unspecified other impact.
CPE | Name | Operator | Version |
---|---|---|---|
opensc | eq | 0.16.0-rc1 | |
opensc | eq | 0.13.0rc1 | |
opensc | eq | 0.18.0 | |
opensc | eq | 0.18.0-rc1 | |
opensc | eq | 0.14.0rtm | |
opensc | eq | 0.16.0 | |
opensc | eq | 0.15.0 | |
opensc | eq | 0.13.0 | |
opensc | eq | 0.17.0-rc2 | |
opensc | eq | 0.16.0-pre1 |
access.redhat.com/errata/RHSA-2019:2154
github.com/OpenSC/OpenSC/commit/360e95d45ac4123255a4c796db96337f332160ad#diff-a6074523a9cbd875e26c58e20868fb15
github.com/OpenSC/OpenSC/releases/tag/0.19.0-rc1
lists.debian.org/debian-lts-announce/2019/09/msg00009.html
www.x41-dsec.de/lab/advisories/x41-2018-002-OpenSC/