Lucene search

K
cveRedhatCVE-2010-4523
HistoryJan 07, 2011 - 8:00 p.m.

CVE-2010-4523

2011-01-0720:00:04
CWE-119
redhat
web.nvd.nist.gov
27
cve-2010-4523
buffer overflow
libopensc
opensc 0.11.13
security vulnerability
nvd

CVSS2

7.2

Attack Vector

LOCAL

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:L/AC:L/Au:N/C:C/I:C/A:C

AI Score

7.4

Confidence

Low

EPSS

0.002

Percentile

62.1%

Multiple stack-based buffer overflows in libopensc in OpenSC 0.11.13 and earlier allow physically proximate attackers to execute arbitrary code via a long serial-number field on a smart card, related to (1) card-acos5.c, (2) card-atrust-acos.c, and (3) card-starcos.c.

Affected configurations

Nvd
Node
opensc-projectopenscRange0.11.13
OR
opensc-projectopenscMatch0.3.2
OR
opensc-projectopenscMatch0.3.5
OR
opensc-projectopenscMatch0.4.0
OR
opensc-projectopenscMatch0.5.0
OR
opensc-projectopenscMatch0.6.0
OR
opensc-projectopenscMatch0.6.1
OR
opensc-projectopenscMatch0.7.0
OR
opensc-projectopenscMatch0.8
OR
opensc-projectopenscMatch0.8.0
OR
opensc-projectopenscMatch0.8.0.0
OR
opensc-projectopenscMatch0.8.1
OR
opensc-projectopenscMatch0.9
OR
opensc-projectopenscMatch0.9.2
OR
opensc-projectopenscMatch0.9.3
OR
opensc-projectopenscMatch0.9.4
OR
opensc-projectopenscMatch0.9.5
OR
opensc-projectopenscMatch0.9.6
OR
opensc-projectopenscMatch0.9.7
OR
opensc-projectopenscMatch0.9.7b
OR
opensc-projectopenscMatch0.9.7d
OR
opensc-projectopenscMatch0.9.8
OR
opensc-projectopenscMatch0.10.0
OR
opensc-projectopenscMatch0.10.1
OR
opensc-projectopenscMatch0.11.0
OR
opensc-projectopenscMatch0.11.1
OR
opensc-projectopenscMatch0.11.2
OR
opensc-projectopenscMatch0.11.3
OR
opensc-projectopenscMatch0.11.3pre3
OR
opensc-projectopenscMatch0.11.4
OR
opensc-projectopenscMatch0.11.5
OR
opensc-projectopenscMatch0.11.6
OR
opensc-projectopenscMatch0.11.7
OR
opensc-projectopenscMatch0.11.8
OR
opensc-projectopenscMatch0.11.9
OR
opensc-projectopenscMatch0.11.10
OR
opensc-projectopenscMatch0.11.11
OR
opensc-projectopenscMatch0.11.12
VendorProductVersionCPE
opensc-projectopensc*cpe:2.3:a:opensc-project:opensc:*:*:*:*:*:*:*:*
opensc-projectopensc0.3.2cpe:2.3:a:opensc-project:opensc:0.3.2:*:*:*:*:*:*:*
opensc-projectopensc0.3.5cpe:2.3:a:opensc-project:opensc:0.3.5:*:*:*:*:*:*:*
opensc-projectopensc0.4.0cpe:2.3:a:opensc-project:opensc:0.4.0:*:*:*:*:*:*:*
opensc-projectopensc0.5.0cpe:2.3:a:opensc-project:opensc:0.5.0:*:*:*:*:*:*:*
opensc-projectopensc0.6.0cpe:2.3:a:opensc-project:opensc:0.6.0:*:*:*:*:*:*:*
opensc-projectopensc0.6.1cpe:2.3:a:opensc-project:opensc:0.6.1:*:*:*:*:*:*:*
opensc-projectopensc0.7.0cpe:2.3:a:opensc-project:opensc:0.7.0:*:*:*:*:*:*:*
opensc-projectopensc0.8cpe:2.3:a:opensc-project:opensc:0.8:*:*:*:*:*:*:*
opensc-projectopensc0.8.0cpe:2.3:a:opensc-project:opensc:0.8.0:*:*:*:*:*:*:*
Rows per page:
1-10 of 381

References

CVSS2

7.2

Attack Vector

LOCAL

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:L/AC:L/Au:N/C:C/I:C/A:C

AI Score

7.4

Confidence

Low

EPSS

0.002

Percentile

62.1%