Lucene search

K
cveRedhatCVE-2023-2977
HistoryJun 01, 2023 - 1:15 a.m.

CVE-2023-2977

2023-06-0101:15:17
CWE-119
CWE-125
redhat
web.nvd.nist.gov
94
opensc
pkcs15
buffer overrun
vulnerability
cve-2023-2977
security flaw
asn1
smart card
asan

CVSS3

7.1

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H

AI Score

6.7

Confidence

High

EPSS

0

Percentile

14.8%

A vulnerbility was found in OpenSC. This security flaw cause a buffer overrun vulnerability in pkcs15 cardos_have_verifyrc_package. The attacker can supply a smart card package with malformed ASN1 context. The cardos_have_verifyrc_package function scans the ASN1 buffer for 2 tags, where remaining length is wrongly caculated due to moved starting pointer. This leads to possible heap-based buffer oob read. In cases where ASAN is enabled while compiling this causes a crash. Further info leak or more damage is possible.

Affected configurations

Nvd
Vulners
Node
opensc_projectopenscMatch0.23.0-
Node
redhatenterprise_linuxMatch8.0
OR
redhatenterprise_linuxMatch9.0
VendorProductVersionCPE
opensc_projectopensc0.23.0cpe:2.3:a:opensc_project:opensc:0.23.0:-:*:*:*:*:*:*
redhatenterprise_linux8.0cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*
redhatenterprise_linux9.0cpe:2.3:o:redhat:enterprise_linux:9.0:*:*:*:*:*:*:*

CNA Affected

[
  {
    "vendor": "n/a",
    "product": "OpenSC",
    "versions": [
      {
        "version": "opensc-0.23.0",
        "status": "affected"
      }
    ]
  }
]

CVSS3

7.1

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H

AI Score

6.7

Confidence

High

EPSS

0

Percentile

14.8%