[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

250038

 
 

909

 
 

195843

 
 

282

Paid content will be excluded from the download.


Download | Alert*
OVAL

ALAS2023-2023-417 --- opensc

ID: oval:org.secpod.oval:def:19500479Date: (C)2024-01-04   (M)2024-02-29
Class: PATCHFamily: unix




Potential PIN bypass.When the token/card was plugged into the computer and authenticated from one process, it could be used to provide cryptographic operations from different process when the empty, zero-length PIN and the token can track the login status using some of its internals. This is dangerous for OS logon/screen unlock and small tokens that are plugged permanently to the computer. multiple memory issues with pkcs15-init Out-of-bounds read in MyEID driver handling encryption using symmetric keysThis issue require physical access to the computer running opensc and crafted USB device or smart card that would present the system with specially crafted responses to the APDUs so they are considered a high-complexity and low-severity.This issue is in the code handling symmetric keys, which are not widely used for example for desktop login so most of the deployments are not affected

Platform:
Amazon Linux 2023
Product:
opensc
Reference:
ALAS2023-2023-417
CVE-2023-40660
CVE-2023-40661
CVE-2023-4535
CVE    3
CVE-2023-40661
CVE-2023-40660
CVE-2023-4535
CPE    1
cpe:/a:opensc:opensc

© SecPod Technologies