CVE-2009-0368

OpenSC before 0.11.7 allows physically proximate attackers to bypass intended PIN requirements and read private data objects via a (1) low level APDU command or (2) debugging tool, as demonstrated by reading the 4601 or 4701 file with the opensc-explorer or opensc-tool program.
References
Link Resource
http://lists.opensuse.org/opensuse-security-announce/2009-05/msg00000.html
http://openwall.com/lists/oss-security/2009/02/26/1 Patch
http://secunia.com/advisories/34052 Vendor Advisory
http://secunia.com/advisories/34120
http://secunia.com/advisories/34362
http://secunia.com/advisories/34377
http://secunia.com/advisories/35065
http://secunia.com/advisories/36074
http://security.gentoo.org/glsa/glsa-200908-01.xml
http://www.debian.org/security/2009/dsa-1734
http://www.opensc-project.org/pipermail/opensc-announce/2009-February/000023.html Vendor Advisory
http://www.securityfocus.com/bid/33922 Exploit Patch
https://exchange.xforce.ibmcloud.com/vulnerabilities/48958
https://www.redhat.com/archives/fedora-package-announce/2009-March/msg00673.html
https://www.redhat.com/archives/fedora-package-announce/2009-March/msg00686.html
http://lists.opensuse.org/opensuse-security-announce/2009-05/msg00000.html
http://openwall.com/lists/oss-security/2009/02/26/1 Patch
http://secunia.com/advisories/34052 Vendor Advisory
http://secunia.com/advisories/34120
http://secunia.com/advisories/34362
http://secunia.com/advisories/34377
http://secunia.com/advisories/35065
http://secunia.com/advisories/36074
http://security.gentoo.org/glsa/glsa-200908-01.xml
http://www.debian.org/security/2009/dsa-1734
http://www.opensc-project.org/pipermail/opensc-announce/2009-February/000023.html Vendor Advisory
http://www.securityfocus.com/bid/33922 Exploit Patch
https://exchange.xforce.ibmcloud.com/vulnerabilities/48958
https://www.redhat.com/archives/fedora-package-announce/2009-March/msg00673.html
https://www.redhat.com/archives/fedora-package-announce/2009-March/msg00686.html
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:opensc-project:opensc:*:*:*:*:*:*:*:*
cpe:2.3:a:opensc-project:opensc:0.3.2:*:*:*:*:*:*:*
cpe:2.3:a:opensc-project:opensc:0.3.5:*:*:*:*:*:*:*
cpe:2.3:a:opensc-project:opensc:0.4.0:*:*:*:*:*:*:*
cpe:2.3:a:opensc-project:opensc:0.5.0:*:*:*:*:*:*:*
cpe:2.3:a:opensc-project:opensc:0.6.0:*:*:*:*:*:*:*
cpe:2.3:a:opensc-project:opensc:0.6.1:*:*:*:*:*:*:*
cpe:2.3:a:opensc-project:opensc:0.7.0:*:*:*:*:*:*:*
cpe:2.3:a:opensc-project:opensc:0.8:*:*:*:*:*:*:*
cpe:2.3:a:opensc-project:opensc:0.8.0:*:*:*:*:*:*:*
cpe:2.3:a:opensc-project:opensc:0.8.0.0:*:*:*:*:*:*:*
cpe:2.3:a:opensc-project:opensc:0.8.1:*:*:*:*:*:*:*
cpe:2.3:a:opensc-project:opensc:0.9:*:*:*:*:*:*:*
cpe:2.3:a:opensc-project:opensc:0.9.2:*:*:*:*:*:*:*
cpe:2.3:a:opensc-project:opensc:0.9.3:*:*:*:*:*:*:*
cpe:2.3:a:opensc-project:opensc:0.9.4:*:*:*:*:*:*:*
cpe:2.3:a:opensc-project:opensc:0.9.5:*:*:*:*:*:*:*
cpe:2.3:a:opensc-project:opensc:0.9.6:*:*:*:*:*:*:*
cpe:2.3:a:opensc-project:opensc:0.9.7:*:*:*:*:*:*:*
cpe:2.3:a:opensc-project:opensc:0.9.7:b:*:*:*:*:*:*
cpe:2.3:a:opensc-project:opensc:0.9.7:d:*:*:*:*:*:*
cpe:2.3:a:opensc-project:opensc:0.9.8:*:*:*:*:*:*:*
cpe:2.3:a:opensc-project:opensc:0.10.0:*:*:*:*:*:*:*
cpe:2.3:a:opensc-project:opensc:0.10.1:*:*:*:*:*:*:*
cpe:2.3:a:opensc-project:opensc:0.11.0:*:*:*:*:*:*:*
cpe:2.3:a:opensc-project:opensc:0.11.1:*:*:*:*:*:*:*
cpe:2.3:a:opensc-project:opensc:0.11.2:*:*:*:*:*:*:*
cpe:2.3:a:opensc-project:opensc:0.11.3:*:*:*:*:*:*:*
cpe:2.3:a:opensc-project:opensc:0.11.3:pre3:*:*:*:*:*:*
cpe:2.3:a:opensc-project:opensc:0.11.4:*:*:*:*:*:*:*
cpe:2.3:a:opensc-project:opensc:0.11.5:*:*:*:*:*:*:*

History

21 Nov 2024, 00:59

Type Values Removed Values Added
References () http://lists.opensuse.org/opensuse-security-announce/2009-05/msg00000.html - () http://lists.opensuse.org/opensuse-security-announce/2009-05/msg00000.html -
References () http://openwall.com/lists/oss-security/2009/02/26/1 - Patch () http://openwall.com/lists/oss-security/2009/02/26/1 - Patch
References () http://secunia.com/advisories/34052 - Vendor Advisory () http://secunia.com/advisories/34052 - Vendor Advisory
References () http://secunia.com/advisories/34120 - () http://secunia.com/advisories/34120 -
References () http://secunia.com/advisories/34362 - () http://secunia.com/advisories/34362 -
References () http://secunia.com/advisories/34377 - () http://secunia.com/advisories/34377 -
References () http://secunia.com/advisories/35065 - () http://secunia.com/advisories/35065 -
References () http://secunia.com/advisories/36074 - () http://secunia.com/advisories/36074 -
References () http://security.gentoo.org/glsa/glsa-200908-01.xml - () http://security.gentoo.org/glsa/glsa-200908-01.xml -
References () http://www.debian.org/security/2009/dsa-1734 - () http://www.debian.org/security/2009/dsa-1734 -
References () http://www.opensc-project.org/pipermail/opensc-announce/2009-February/000023.html - Vendor Advisory () http://www.opensc-project.org/pipermail/opensc-announce/2009-February/000023.html - Vendor Advisory
References () http://www.securityfocus.com/bid/33922 - Exploit, Patch () http://www.securityfocus.com/bid/33922 - Exploit, Patch
References () https://exchange.xforce.ibmcloud.com/vulnerabilities/48958 - () https://exchange.xforce.ibmcloud.com/vulnerabilities/48958 -
References () https://www.redhat.com/archives/fedora-package-announce/2009-March/msg00673.html - () https://www.redhat.com/archives/fedora-package-announce/2009-March/msg00673.html -
References () https://www.redhat.com/archives/fedora-package-announce/2009-March/msg00686.html - () https://www.redhat.com/archives/fedora-package-announce/2009-March/msg00686.html -

Information

Published : 2009-03-02 22:30

Updated : 2024-11-21 00:59


NVD link : CVE-2009-0368

Mitre link : CVE-2009-0368

CVE.ORG link : CVE-2009-0368


JSON object : View

Products Affected

opensc-project

  • opensc
CWE
CWE-310

Cryptographic Issues