Lucene search

K
centosCentOS ProjectCESA-2013:0525
HistoryFeb 27, 2013 - 7:37 p.m.

pcsc security update

2013-02-2719:37:16
CentOS Project
lists.centos.org
51

CVSS2

4.4

Attack Vector

LOCAL

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:L/AC:M/Au:N/C:P/I:P/A:P

EPSS

0.001

Percentile

46.8%

CentOS Errata and Security Advisory CESA-2013:0525

PC/SC Lite provides a Windows SCard compatible interface for communicating
with smart cards, smart card readers, and other security tokens.

A stack-based buffer overflow flaw was found in the way pcsc-lite decoded
certain attribute values of Answer-to-Reset (ATR) messages. A local
attacker could use this flaw to execute arbitrary code with the privileges
of the user running the pcscd daemon (root, by default), by inserting a
specially-crafted smart card. (CVE-2010-4531)

This update also fixes the following bugs:

  • Due to an error in the init script, the chkconfig utility did not
    automatically place the pcscd init script after the start of the HAL
    daemon. Consequently, the pcscd service did not start automatically at boot
    time. With this update, the pcscd init script has been changed to
    explicitly start only after HAL is up, thus fixing this bug. (BZ#788474,
    BZ#814549)

  • Because the chkconfig settings and the startup files in the /etc/rc.d/
    directory were not changed during the update described in the
    RHBA-2012:0990 advisory, the user had to update the chkconfig settings
    manually to fix the problem. Now, the chkconfig settings and the startup
    files in the /etc/rc.d/ directory are automatically updated as expected.
    (BZ#834803)

  • Previously, the SCardGetAttrib() function did not work properly and
    always returned the “SCARD_E_INSUFFICIENT_BUFFER” error regardless of the
    actual buffer size. This update applies a patch to fix this bug and the
    SCardGetAttrib() function now works as expected. (BZ#891852)

All users of pcsc-lite are advised to upgrade to these updated packages,
which fix these issues. After installing this update, the pcscd daemon will
be restarted automatically.

Merged security bulletin from advisories:
https://lists.centos.org/pipermail/centos-announce/2013-March/081628.html
https://lists.centos.org/pipermail/centos-cr-announce/2013-February/026927.html

Affected packages:
pcsc-lite
pcsc-lite-devel
pcsc-lite-doc
pcsc-lite-libs

Upstream details at:
https://access.redhat.com/errata/RHSA-2013:0525

CVSS2

4.4

Attack Vector

LOCAL

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:L/AC:M/Au:N/C:P/I:P/A:P

EPSS

0.001

Percentile

46.8%