6.8 Medium
CVSS2
Access Vector
LOCAL
Access Complexity
LOW
Authentication
SINGLE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:L/AC:L/Au:S/C:C/I:C/A:C
PC/SC Lite is vulnerable to buffer overflow in the way the pcscd daemon. It is due to a resource manager that coordinates communications with smart card readers and smart cards connected to the system, handled client requests. A local user could create a specially-crafted request that would cause the pcscd daemon to crash or, possibly, execute arbitrary code.
CPE | Name | Operator | Version |
---|---|---|---|
pcsc-lite | eq | 1.4.4__0.1.el5 | |
pcsc-lite | eq | 1.4.4__1.el5 | |
pcsc-lite | eq | 1.4.4__0.1.el5 | |
pcsc-lite | eq | 1.4.4__1.el5 |
kb.juniper.net/InfoCenter/index?page=content&id=JSA10691
kb.juniper.net/InfoCenter/index?page=content&id=JSA10705
lists.fedoraproject.org/pipermail/package-announce/2010-July/044124.html
lists.fedoraproject.org/pipermail/package-announce/2010-June/042900.html
lists.fedoraproject.org/pipermail/package-announce/2010-June/042921.html
lists.opensuse.org/opensuse-security-announce/2010-09/msg00006.html
secunia.com/advisories/40140
secunia.com/advisories/40239
svn.debian.org/wsvn/pcsclite/?sc=1&rev=4208
www.debian.org/security/2010/dsa-2059
www.redhat.com/security/updates/classification/#moderate
www.securityfocus.com/bid/40758
www.vupen.com/english/advisories/2010/1427
www.vupen.com/english/advisories/2010/1508
access.redhat.com/errata/RHSA-2010:0533
bugzilla.redhat.com/show_bug.cgi?id=596426