CVE-2010-0407

Multiple buffer overflows in the MSGFunctionDemarshall function in winscard_svc.c in the PC/SC Smart Card daemon (aka PCSCD) in MUSCLE PCSC-Lite before 1.5.4 allow local users to gain privileges via crafted message data, which is improperly demarshalled.
References
Link Resource
http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10691
http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10705
http://lists.fedoraproject.org/pipermail/package-announce/2010-July/044124.html
http://lists.fedoraproject.org/pipermail/package-announce/2010-June/042900.html
http://lists.fedoraproject.org/pipermail/package-announce/2010-June/042921.html
http://lists.opensuse.org/opensuse-security-announce/2010-09/msg00006.html
http://secunia.com/advisories/40140 Vendor Advisory
http://secunia.com/advisories/40239 Vendor Advisory
http://svn.debian.org/wsvn/pcsclite/?sc=1&rev=4208
http://www.debian.org/security/2010/dsa-2059 Patch
http://www.securityfocus.com/bid/40758 Patch
http://www.vupen.com/english/advisories/2010/1427 Vendor Advisory
http://www.vupen.com/english/advisories/2010/1508 Vendor Advisory
https://bugzilla.redhat.com/show_bug.cgi?id=596426 Patch
http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10691
http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10705
http://lists.fedoraproject.org/pipermail/package-announce/2010-July/044124.html
http://lists.fedoraproject.org/pipermail/package-announce/2010-June/042900.html
http://lists.fedoraproject.org/pipermail/package-announce/2010-June/042921.html
http://lists.opensuse.org/opensuse-security-announce/2010-09/msg00006.html
http://secunia.com/advisories/40140 Vendor Advisory
http://secunia.com/advisories/40239 Vendor Advisory
http://svn.debian.org/wsvn/pcsclite/?sc=1&rev=4208
http://www.debian.org/security/2010/dsa-2059 Patch
http://www.securityfocus.com/bid/40758 Patch
http://www.vupen.com/english/advisories/2010/1427 Vendor Advisory
http://www.vupen.com/english/advisories/2010/1508 Vendor Advisory
https://bugzilla.redhat.com/show_bug.cgi?id=596426 Patch
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:muscle:pcsc-lite:*:*:*:*:*:*:*:*
cpe:2.3:a:muscle:pcsc-lite:1.1.2:beta2:*:*:*:*:*:*
cpe:2.3:a:muscle:pcsc-lite:1.1.2:beta3:*:*:*:*:*:*
cpe:2.3:a:muscle:pcsc-lite:1.1.2:beta4:*:*:*:*:*:*
cpe:2.3:a:muscle:pcsc-lite:1.1.2:beta5:*:*:*:*:*:*
cpe:2.3:a:muscle:pcsc-lite:1.2.0:*:*:*:*:*:*:*
cpe:2.3:a:muscle:pcsc-lite:1.2.0:rc1:*:*:*:*:*:*
cpe:2.3:a:muscle:pcsc-lite:1.2.0:rc2:*:*:*:*:*:*
cpe:2.3:a:muscle:pcsc-lite:1.2.0:rc3:*:*:*:*:*:*
cpe:2.3:a:muscle:pcsc-lite:1.2.9:beta1:*:*:*:*:*:*
cpe:2.3:a:muscle:pcsc-lite:1.2.9:beta10:*:*:*:*:*:*
cpe:2.3:a:muscle:pcsc-lite:1.2.9:beta2:*:*:*:*:*:*
cpe:2.3:a:muscle:pcsc-lite:1.2.9:beta3:*:*:*:*:*:*
cpe:2.3:a:muscle:pcsc-lite:1.2.9:beta4:*:*:*:*:*:*
cpe:2.3:a:muscle:pcsc-lite:1.2.9:beta5:*:*:*:*:*:*
cpe:2.3:a:muscle:pcsc-lite:1.2.9:beta6:*:*:*:*:*:*
cpe:2.3:a:muscle:pcsc-lite:1.2.9:beta7:*:*:*:*:*:*
cpe:2.3:a:muscle:pcsc-lite:1.2.9:beta8:*:*:*:*:*:*
cpe:2.3:a:muscle:pcsc-lite:1.2.9:beta9:*:*:*:*:*:*
cpe:2.3:a:muscle:pcsc-lite:1.3.0:*:*:*:*:*:*:*
cpe:2.3:a:muscle:pcsc-lite:1.3.1:*:*:*:*:*:*:*
cpe:2.3:a:muscle:pcsc-lite:1.3.2:*:*:*:*:*:*:*
cpe:2.3:a:muscle:pcsc-lite:1.3.3:*:*:*:*:*:*:*
cpe:2.3:a:muscle:pcsc-lite:1.4.0:*:*:*:*:*:*:*
cpe:2.3:a:muscle:pcsc-lite:1.4.1:*:*:*:*:*:*:*
cpe:2.3:a:muscle:pcsc-lite:1.4.2:*:*:*:*:*:*:*
cpe:2.3:a:muscle:pcsc-lite:1.4.3:*:*:*:*:*:*:*
cpe:2.3:a:muscle:pcsc-lite:1.4.4:*:*:*:*:*:*:*
cpe:2.3:a:muscle:pcsc-lite:1.4.99:*:*:*:*:*:*:*
cpe:2.3:a:muscle:pcsc-lite:1.4.100:*:*:*:*:*:*:*
cpe:2.3:a:muscle:pcsc-lite:1.4.101:*:*:*:*:*:*:*
cpe:2.3:a:muscle:pcsc-lite:1.4.102:*:*:*:*:*:*:*
cpe:2.3:a:muscle:pcsc-lite:1.5.0:*:*:*:*:*:*:*
cpe:2.3:a:muscle:pcsc-lite:1.5.1:*:*:*:*:*:*:*
cpe:2.3:a:muscle:pcsc-lite:1.5.2:*:*:*:*:*:*:*

History

21 Nov 2024, 01:12

Type Values Removed Values Added
References () http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10691 - () http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10691 -
References () http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10705 - () http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10705 -
References () http://lists.fedoraproject.org/pipermail/package-announce/2010-July/044124.html - () http://lists.fedoraproject.org/pipermail/package-announce/2010-July/044124.html -
References () http://lists.fedoraproject.org/pipermail/package-announce/2010-June/042900.html - () http://lists.fedoraproject.org/pipermail/package-announce/2010-June/042900.html -
References () http://lists.fedoraproject.org/pipermail/package-announce/2010-June/042921.html - () http://lists.fedoraproject.org/pipermail/package-announce/2010-June/042921.html -
References () http://lists.opensuse.org/opensuse-security-announce/2010-09/msg00006.html - () http://lists.opensuse.org/opensuse-security-announce/2010-09/msg00006.html -
References () http://secunia.com/advisories/40140 - Vendor Advisory () http://secunia.com/advisories/40140 - Vendor Advisory
References () http://secunia.com/advisories/40239 - Vendor Advisory () http://secunia.com/advisories/40239 - Vendor Advisory
References () http://svn.debian.org/wsvn/pcsclite/?sc=1&rev=4208 - () http://svn.debian.org/wsvn/pcsclite/?sc=1&rev=4208 -
References () http://www.debian.org/security/2010/dsa-2059 - Patch () http://www.debian.org/security/2010/dsa-2059 - Patch
References () http://www.securityfocus.com/bid/40758 - Patch () http://www.securityfocus.com/bid/40758 - Patch
References () http://www.vupen.com/english/advisories/2010/1427 - Vendor Advisory () http://www.vupen.com/english/advisories/2010/1427 - Vendor Advisory
References () http://www.vupen.com/english/advisories/2010/1508 - Vendor Advisory () http://www.vupen.com/english/advisories/2010/1508 - Vendor Advisory
References () https://bugzilla.redhat.com/show_bug.cgi?id=596426 - Patch () https://bugzilla.redhat.com/show_bug.cgi?id=596426 - Patch

Information

Published : 2010-06-18 16:30

Updated : 2024-11-21 01:12


NVD link : CVE-2010-0407

Mitre link : CVE-2010-0407

CVE.ORG link : CVE-2010-0407


JSON object : View

Products Affected

muscle

  • pcsc-lite
CWE
CWE-119

Improper Restriction of Operations within the Bounds of a Memory Buffer