Vulnerability CVE-2009-0368


Published: 2009-03-02   Modified: 2012-02-13

Description:
OpenSC before 0.11.7 allows physically proximate attackers to bypass intended PIN requirements and read private data objects via a (1) low level APDU command or (2) debugging tool, as demonstrated by reading the 4601 or 4701 file with the opensc-explorer or opensc-tool program.

Type:

CWE-310

(Cryptographic Issues)

CVSS2 => (AV:L/AC:L/Au:N/C:P/I:N/A:N)

CVSS Base Score
Impact Subscore
Exploitability Subscore
2.1/10
2.9/10
3.9/10
Exploit range
Attack complexity
Authentication
Local
Low
No required
Confidentiality impact
Integrity impact
Availability impact
Partial
None
None
Affected software
Opensc-project -> Opensc 

 References:
http://www.securityfocus.com/bid/33922
http://openwall.com/lists/oss-security/2009/02/26/1
https://www.redhat.com/archives/fedora-package-announce/2009-March/msg00686.html
https://www.redhat.com/archives/fedora-package-announce/2009-March/msg00673.html
http://xforce.iss.net/xforce/xfdb/48958
http://www.opensc-project.org/pipermail/opensc-announce/2009-February/000023.html
http://www.debian.org/security/2009/dsa-1734
http://security.gentoo.org/glsa/glsa-200908-01.xml
http://secunia.com/advisories/36074
http://secunia.com/advisories/35065
http://secunia.com/advisories/34377
http://secunia.com/advisories/34362
http://secunia.com/advisories/34120
http://secunia.com/advisories/34052
http://lists.opensuse.org/opensuse-security-announce/2009-05/msg00000.html

Copyright 2024, cxsecurity.com

 

Back to Top