Информационная безопасность
[RU] switch to English


Переполнение буфера в библиотеке OpenSC / PCSC-Lite
дополнено с 19 января 2011 г.
Опубликовано:24 января 2011 г.
Источник:
SecurityVulns ID:11364
Тип:библиотека
Уровень опасности:
6/10
Описание:Переполнение буфера на длинном номере смарткарты.
Затронутые продукты:OPENSC : OpenSC 0.11
 PCSCLITE : PCSC-Lite 1.5
CVE:CVE-2010-4531 (Stack-based buffer overflow in the ATRDecodeAtr function in the Answer-to-Reset (ATR) Handler (atrhandler.c) for pcscd in PCSC-Lite 1.5.3, and possibly other 1.5.x and 1.6.x versions, allows physically proximate attackers to cause a denial of service (crash) and possibly execute arbitrary code via a smart card with an ATR message containing a long attribute value.)
 CVE-2010-4530 (Signedness error in ccid_serial.c in libccid in the USB Chip/Smart Card Interface Devices (CCID) driver, as used in pcscd in PCSC-Lite 1.5.3 and possibly other products, allows physically proximate attackers to execute arbitrary code via a smart card with a crafted serial number that causes a negative value to be used in a memcpy operation, which triggers a buffer overflow. NOTE: some sources refer to this issue as an integer overflow.)
 CVE-2010-4523 (Multiple stack-based buffer overflows in libopensc in OpenSC 0.11.13 and earlier allow physically proximate attackers to execute arbitrary code via a long serial-number field on a smart card, related to (1) card-acos5.c, (2) card-atrust-acos.c, and (3) card-starcos.c.)
Оригинальный текстdocumentMANDRIVA, [ MDVSA-2011:015 ] pcsc-lite (24.01.2011)
 documentMANDRIVA, [ MDVSA-2011:014 ] ccid (24.01.2011)
 documentMANDRIVA, [ MDVSA-2011:011 ] opensc (19.01.2011)

О сайте | Условия использования
© SecurityVulns, 3APA3A, Владимир Дубровин
Нижний Новгород