A vulnerbility was found in OpenSC. This security flaw cause a buffer overrun vulnerability in pkcs15 cardos_have_verifyrc_package. The attacker can supply a smart card package with malformed ASN1 context. The cardos_have_verifyrc_package function scans the ASN1 buffer for 2 tags, where remaining length is wrongly caculated due to moved starting pointer. This leads to possible heap-based buffer oob read. In cases where ASAN is enabled while compiling this causes a crash. Further info leak or more damage is possible.
CPE | Name | Operator | Version |
---|---|---|---|
opensc | eq | 0.23.0 | |
enterprise_linux | eq | 8.0 | |
enterprise_linux | eq | 9.0 |
access.redhat.com/security/cve/CVE-2023-2977
bugzilla.redhat.com/show_bug.cgi?id=2211088
github.com/OpenSC/OpenSC/issues/2785
github.com/OpenSC/OpenSC/pull/2787
lists.debian.org/debian-lts-announce/2023/06/msg00025.html
lists.fedoraproject.org/archives/list/[email protected]/message/FJD4Q4AJSGE5UIJI7OUYZY4HGGCVYQNI/
lists.fedoraproject.org/archives/list/[email protected]/message/LAR54OV6EHA56B4XJF6RNPQ4HJ2ITU66/