CVE-2010-4531

Stack-based buffer overflow in the ATRDecodeAtr function in the Answer-to-Reset (ATR) Handler (atrhandler.c) for pcscd in PCSC-Lite 1.5.3, and possibly other 1.5.x and 1.6.x versions, allows physically proximate attackers to cause a denial of service (crash) and possibly execute arbitrary code via a smart card with an ATR message containing a long attribute value.
References
Link Resource
http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=607781 Patch
http://labs.mwrinfosecurity.com/files/Advisories/mwri_pcsc-atr-handler-buffer-overflow_2010-12-13.pdf Patch
http://lists.alioth.debian.org/pipermail/pcsclite-cvs-commit/2010-November/004923.html Patch
http://lists.fedoraproject.org/pipermail/package-announce/2011-January/053079.html
http://lists.fedoraproject.org/pipermail/package-announce/2011-January/053095.html
http://secunia.com/advisories/42912 Vendor Advisory
http://secunia.com/advisories/43112
http://www.debian.org/security/2011/dsa-2156
http://www.mandriva.com/security/advisories?name=MDVSA-2011:015
http://www.openwall.com/lists/oss-security/2010/12/22/7 Patch
http://www.openwall.com/lists/oss-security/2011/01/03/3 Patch
http://www.securityfocus.com/bid/45450
http://www.vupen.com/english/advisories/2010/3264 Vendor Advisory
http://www.vupen.com/english/advisories/2011/0101 Vendor Advisory
http://www.vupen.com/english/advisories/2011/0180
http://www.vupen.com/english/advisories/2011/0256
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2010-4531 Patch
http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=607781 Patch
http://labs.mwrinfosecurity.com/files/Advisories/mwri_pcsc-atr-handler-buffer-overflow_2010-12-13.pdf Patch
http://lists.alioth.debian.org/pipermail/pcsclite-cvs-commit/2010-November/004923.html Patch
http://lists.fedoraproject.org/pipermail/package-announce/2011-January/053079.html
http://lists.fedoraproject.org/pipermail/package-announce/2011-January/053095.html
http://secunia.com/advisories/42912 Vendor Advisory
http://secunia.com/advisories/43112
http://www.debian.org/security/2011/dsa-2156
http://www.mandriva.com/security/advisories?name=MDVSA-2011:015
http://www.openwall.com/lists/oss-security/2010/12/22/7 Patch
http://www.openwall.com/lists/oss-security/2011/01/03/3 Patch
http://www.securityfocus.com/bid/45450
http://www.vupen.com/english/advisories/2010/3264 Vendor Advisory
http://www.vupen.com/english/advisories/2011/0101 Vendor Advisory
http://www.vupen.com/english/advisories/2011/0180
http://www.vupen.com/english/advisories/2011/0256
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2010-4531 Patch
Configurations

Configuration 1 (hide)

cpe:2.3:a:muscle:pcsc-lite:1.5.3:*:*:*:*:*:*:*

History

21 Nov 2024, 01:21

Type Values Removed Values Added
References () http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=607781 - Patch () http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=607781 - Patch
References () http://labs.mwrinfosecurity.com/files/Advisories/mwri_pcsc-atr-handler-buffer-overflow_2010-12-13.pdf - Patch () http://labs.mwrinfosecurity.com/files/Advisories/mwri_pcsc-atr-handler-buffer-overflow_2010-12-13.pdf - Patch
References () http://lists.alioth.debian.org/pipermail/pcsclite-cvs-commit/2010-November/004923.html - Patch () http://lists.alioth.debian.org/pipermail/pcsclite-cvs-commit/2010-November/004923.html - Patch
References () http://lists.fedoraproject.org/pipermail/package-announce/2011-January/053079.html - () http://lists.fedoraproject.org/pipermail/package-announce/2011-January/053079.html -
References () http://lists.fedoraproject.org/pipermail/package-announce/2011-January/053095.html - () http://lists.fedoraproject.org/pipermail/package-announce/2011-January/053095.html -
References () http://secunia.com/advisories/42912 - Vendor Advisory () http://secunia.com/advisories/42912 - Vendor Advisory
References () http://secunia.com/advisories/43112 - () http://secunia.com/advisories/43112 -
References () http://www.debian.org/security/2011/dsa-2156 - () http://www.debian.org/security/2011/dsa-2156 -
References () http://www.mandriva.com/security/advisories?name=MDVSA-2011:015 - () http://www.mandriva.com/security/advisories?name=MDVSA-2011:015 -
References () http://www.openwall.com/lists/oss-security/2010/12/22/7 - Patch () http://www.openwall.com/lists/oss-security/2010/12/22/7 - Patch
References () http://www.openwall.com/lists/oss-security/2011/01/03/3 - Patch () http://www.openwall.com/lists/oss-security/2011/01/03/3 - Patch
References () http://www.securityfocus.com/bid/45450 - () http://www.securityfocus.com/bid/45450 -
References () http://www.vupen.com/english/advisories/2010/3264 - Vendor Advisory () http://www.vupen.com/english/advisories/2010/3264 - Vendor Advisory
References () http://www.vupen.com/english/advisories/2011/0101 - Vendor Advisory () http://www.vupen.com/english/advisories/2011/0101 - Vendor Advisory
References () http://www.vupen.com/english/advisories/2011/0180 - () http://www.vupen.com/english/advisories/2011/0180 -
References () http://www.vupen.com/english/advisories/2011/0256 - () http://www.vupen.com/english/advisories/2011/0256 -
References () https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2010-4531 - Patch () https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2010-4531 - Patch

Information

Published : 2011-01-18 18:03

Updated : 2024-11-21 01:21


NVD link : CVE-2010-4531

Mitre link : CVE-2010-4531

CVE.ORG link : CVE-2010-4531


JSON object : View

Products Affected

muscle

  • pcsc-lite
CWE
CWE-119

Improper Restriction of Operations within the Bounds of a Memory Buffer