CVE-2010-4523

Multiple stack-based buffer overflows in libopensc in OpenSC 0.11.13 and earlier allow physically proximate attackers to execute arbitrary code via a long serial-number field on a smart card, related to (1) card-acos5.c, (2) card-atrust-acos.c, and (3) card-starcos.c.
References
Link Resource
http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=607427 Exploit Patch
http://labs.mwrinfosecurity.com/files/Advisories/mwri_opensc-get-serial-buffer-overflow_2010-12-13.pdf Exploit Patch
http://lists.fedoraproject.org/pipermail/package-announce/2011-January/052777.html
http://lists.fedoraproject.org/pipermail/package-announce/2011-January/052796.html
http://lists.opensuse.org/opensuse-security-announce/2011-01/msg00006.html
http://openwall.com/lists/oss-security/2010/12/21/2 Exploit Patch
http://openwall.com/lists/oss-security/2010/12/22/3 Exploit Patch
http://secunia.com/advisories/42658 Vendor Advisory
http://secunia.com/advisories/42807 Vendor Advisory
http://secunia.com/advisories/43068
http://www.h-online.com/open/news/item/When-a-smart-card-can-root-your-computer-1154829.html Patch
http://www.mandriva.com/security/advisories?name=MDVSA-2011:011
http://www.securityfocus.com/bid/45435
http://www.vupen.com/english/advisories/2011/0009 Vendor Advisory
http://www.vupen.com/english/advisories/2011/0109
http://www.vupen.com/english/advisories/2011/0212
https://bugs.launchpad.net/ubuntu/+source/opensc/+bug/692483 Patch
https://bugzilla.redhat.com/show_bug.cgi?id=664831 Exploit Patch
https://www.opensc-project.org/opensc/changeset/4913 Patch
http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=607427 Exploit Patch
http://labs.mwrinfosecurity.com/files/Advisories/mwri_opensc-get-serial-buffer-overflow_2010-12-13.pdf Exploit Patch
http://lists.fedoraproject.org/pipermail/package-announce/2011-January/052777.html
http://lists.fedoraproject.org/pipermail/package-announce/2011-January/052796.html
http://lists.opensuse.org/opensuse-security-announce/2011-01/msg00006.html
http://openwall.com/lists/oss-security/2010/12/21/2 Exploit Patch
http://openwall.com/lists/oss-security/2010/12/22/3 Exploit Patch
http://secunia.com/advisories/42658 Vendor Advisory
http://secunia.com/advisories/42807 Vendor Advisory
http://secunia.com/advisories/43068
http://www.h-online.com/open/news/item/When-a-smart-card-can-root-your-computer-1154829.html Patch
http://www.mandriva.com/security/advisories?name=MDVSA-2011:011
http://www.securityfocus.com/bid/45435
http://www.vupen.com/english/advisories/2011/0009 Vendor Advisory
http://www.vupen.com/english/advisories/2011/0109
http://www.vupen.com/english/advisories/2011/0212
https://bugs.launchpad.net/ubuntu/+source/opensc/+bug/692483 Patch
https://bugzilla.redhat.com/show_bug.cgi?id=664831 Exploit Patch
https://www.opensc-project.org/opensc/changeset/4913 Patch
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:opensc-project:opensc:*:*:*:*:*:*:*:*
cpe:2.3:a:opensc-project:opensc:0.3.2:*:*:*:*:*:*:*
cpe:2.3:a:opensc-project:opensc:0.3.5:*:*:*:*:*:*:*
cpe:2.3:a:opensc-project:opensc:0.4.0:*:*:*:*:*:*:*
cpe:2.3:a:opensc-project:opensc:0.5.0:*:*:*:*:*:*:*
cpe:2.3:a:opensc-project:opensc:0.6.0:*:*:*:*:*:*:*
cpe:2.3:a:opensc-project:opensc:0.6.1:*:*:*:*:*:*:*
cpe:2.3:a:opensc-project:opensc:0.7.0:*:*:*:*:*:*:*
cpe:2.3:a:opensc-project:opensc:0.8:*:*:*:*:*:*:*
cpe:2.3:a:opensc-project:opensc:0.8.0:*:*:*:*:*:*:*
cpe:2.3:a:opensc-project:opensc:0.8.0.0:*:*:*:*:*:*:*
cpe:2.3:a:opensc-project:opensc:0.8.1:*:*:*:*:*:*:*
cpe:2.3:a:opensc-project:opensc:0.9:*:*:*:*:*:*:*
cpe:2.3:a:opensc-project:opensc:0.9.2:*:*:*:*:*:*:*
cpe:2.3:a:opensc-project:opensc:0.9.3:*:*:*:*:*:*:*
cpe:2.3:a:opensc-project:opensc:0.9.4:*:*:*:*:*:*:*
cpe:2.3:a:opensc-project:opensc:0.9.5:*:*:*:*:*:*:*
cpe:2.3:a:opensc-project:opensc:0.9.6:*:*:*:*:*:*:*
cpe:2.3:a:opensc-project:opensc:0.9.7:*:*:*:*:*:*:*
cpe:2.3:a:opensc-project:opensc:0.9.7:b:*:*:*:*:*:*
cpe:2.3:a:opensc-project:opensc:0.9.7:d:*:*:*:*:*:*
cpe:2.3:a:opensc-project:opensc:0.9.8:*:*:*:*:*:*:*
cpe:2.3:a:opensc-project:opensc:0.10.0:*:*:*:*:*:*:*
cpe:2.3:a:opensc-project:opensc:0.10.1:*:*:*:*:*:*:*
cpe:2.3:a:opensc-project:opensc:0.11.0:*:*:*:*:*:*:*
cpe:2.3:a:opensc-project:opensc:0.11.1:*:*:*:*:*:*:*
cpe:2.3:a:opensc-project:opensc:0.11.2:*:*:*:*:*:*:*
cpe:2.3:a:opensc-project:opensc:0.11.3:*:*:*:*:*:*:*
cpe:2.3:a:opensc-project:opensc:0.11.3:pre3:*:*:*:*:*:*
cpe:2.3:a:opensc-project:opensc:0.11.4:*:*:*:*:*:*:*
cpe:2.3:a:opensc-project:opensc:0.11.5:*:*:*:*:*:*:*
cpe:2.3:a:opensc-project:opensc:0.11.6:*:*:*:*:*:*:*
cpe:2.3:a:opensc-project:opensc:0.11.7:*:*:*:*:*:*:*
cpe:2.3:a:opensc-project:opensc:0.11.8:*:*:*:*:*:*:*
cpe:2.3:a:opensc-project:opensc:0.11.9:*:*:*:*:*:*:*
cpe:2.3:a:opensc-project:opensc:0.11.10:*:*:*:*:*:*:*
cpe:2.3:a:opensc-project:opensc:0.11.11:*:*:*:*:*:*:*
cpe:2.3:a:opensc-project:opensc:0.11.12:*:*:*:*:*:*:*

History

21 Nov 2024, 01:21

Type Values Removed Values Added
References () http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=607427 - Exploit, Patch () http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=607427 - Exploit, Patch
References () http://labs.mwrinfosecurity.com/files/Advisories/mwri_opensc-get-serial-buffer-overflow_2010-12-13.pdf - Exploit, Patch () http://labs.mwrinfosecurity.com/files/Advisories/mwri_opensc-get-serial-buffer-overflow_2010-12-13.pdf - Exploit, Patch
References () http://lists.fedoraproject.org/pipermail/package-announce/2011-January/052777.html - () http://lists.fedoraproject.org/pipermail/package-announce/2011-January/052777.html -
References () http://lists.fedoraproject.org/pipermail/package-announce/2011-January/052796.html - () http://lists.fedoraproject.org/pipermail/package-announce/2011-January/052796.html -
References () http://lists.opensuse.org/opensuse-security-announce/2011-01/msg00006.html - () http://lists.opensuse.org/opensuse-security-announce/2011-01/msg00006.html -
References () http://openwall.com/lists/oss-security/2010/12/21/2 - Exploit, Patch () http://openwall.com/lists/oss-security/2010/12/21/2 - Exploit, Patch
References () http://openwall.com/lists/oss-security/2010/12/22/3 - Exploit, Patch () http://openwall.com/lists/oss-security/2010/12/22/3 - Exploit, Patch
References () http://secunia.com/advisories/42658 - Vendor Advisory () http://secunia.com/advisories/42658 - Vendor Advisory
References () http://secunia.com/advisories/42807 - Vendor Advisory () http://secunia.com/advisories/42807 - Vendor Advisory
References () http://secunia.com/advisories/43068 - () http://secunia.com/advisories/43068 -
References () http://www.h-online.com/open/news/item/When-a-smart-card-can-root-your-computer-1154829.html - Patch () http://www.h-online.com/open/news/item/When-a-smart-card-can-root-your-computer-1154829.html - Patch
References () http://www.mandriva.com/security/advisories?name=MDVSA-2011:011 - () http://www.mandriva.com/security/advisories?name=MDVSA-2011:011 -
References () http://www.securityfocus.com/bid/45435 - () http://www.securityfocus.com/bid/45435 -
References () http://www.vupen.com/english/advisories/2011/0009 - Vendor Advisory () http://www.vupen.com/english/advisories/2011/0009 - Vendor Advisory
References () http://www.vupen.com/english/advisories/2011/0109 - () http://www.vupen.com/english/advisories/2011/0109 -
References () http://www.vupen.com/english/advisories/2011/0212 - () http://www.vupen.com/english/advisories/2011/0212 -
References () https://bugs.launchpad.net/ubuntu/+source/opensc/+bug/692483 - Patch () https://bugs.launchpad.net/ubuntu/+source/opensc/+bug/692483 - Patch
References () https://bugzilla.redhat.com/show_bug.cgi?id=664831 - Exploit, Patch () https://bugzilla.redhat.com/show_bug.cgi?id=664831 - Exploit, Patch
References () https://www.opensc-project.org/opensc/changeset/4913 - Patch () https://www.opensc-project.org/opensc/changeset/4913 - Patch

Information

Published : 2011-01-07 20:00

Updated : 2024-11-21 01:21


NVD link : CVE-2010-4523

Mitre link : CVE-2010-4523

CVE.ORG link : CVE-2010-4523


JSON object : View

Products Affected

opensc-project

  • opensc
CWE
CWE-119

Improper Restriction of Operations within the Bounds of a Memory Buffer