製品・ソフトウェアに関する情報
OpenSC の libopensc におけるスタックベースのバッファオーバーフローの脆弱性
Title OpenSC の libopensc におけるスタックベースのバッファオーバーフローの脆弱性
Summary

OpenSC の libopensc には、(1) card-acos5.c、(2) card-atrust-acos.c、または (3) card-starcos.c に関する処理に不備があるため、スタックベースのバッファオーバーフローの脆弱性が存在します。

Possible impacts 攻撃者により、スマートカードの過度に長いシリアルナンバーフィールドを介して、任意のファイルを実行される可能性があります。
Solution

ベンダ情報および参考情報を参照して適切な対策を実施してください。

Publication Date Jan. 7, 2011, midnight
Registration Date March 27, 2012, 6:42 p.m.
Last Update March 27, 2012, 6:42 p.m.
CVSS2.0 : 危険
Score 7.2
Vector AV:L/AC:L/Au:N/C:C/I:C/A:C
Affected System
OpenSC team
OpenSC 0.11.13 およびそれ以前
CVE (情報セキュリティ 共通脆弱性識別子)
CWE (共通脆弱性タイプ一覧)
ベンダー情報
Change Log
No Changed Details Date of change
0 [2012年03月27日]
  掲載
Feb. 17, 2018, 10:37 a.m.

NVD Vulnerability Information
CVE-2010-4523
Summary

Multiple stack-based buffer overflows in libopensc in OpenSC 0.11.13 and earlier allow physically proximate attackers to execute arbitrary code via a long serial-number field on a smart card, related to (1) card-acos5.c, (2) card-atrust-acos.c, and (3) card-starcos.c.

Publication Date Jan. 8, 2011, 5 a.m.
Registration Date Jan. 29, 2021, 11:09 a.m.
Last Update Nov. 21, 2024, 10:21 a.m.
Affected software configurations
Configuration1 or higher or less more than less than
cpe:2.3:a:opensc-project:opensc:0.11.3:pre3:*:*:*:*:*:*
cpe:2.3:a:opensc-project:opensc:0.11.8:*:*:*:*:*:*:*
cpe:2.3:a:opensc-project:opensc:0.11.3:*:*:*:*:*:*:*
cpe:2.3:a:opensc-project:opensc:0.9:*:*:*:*:*:*:*
cpe:2.3:a:opensc-project:opensc:0.8:*:*:*:*:*:*:*
cpe:2.3:a:opensc-project:opensc:0.11.9:*:*:*:*:*:*:*
cpe:2.3:a:opensc-project:opensc:0.9.6:*:*:*:*:*:*:*
cpe:2.3:a:opensc-project:opensc:0.10.0:*:*:*:*:*:*:*
cpe:2.3:a:opensc-project:opensc:0.9.2:*:*:*:*:*:*:*
cpe:2.3:a:opensc-project:opensc:0.8.0:*:*:*:*:*:*:*
cpe:2.3:a:opensc-project:opensc:0.3.2:*:*:*:*:*:*:*
cpe:2.3:a:opensc-project:opensc:0.11.2:*:*:*:*:*:*:*
cpe:2.3:a:opensc-project:opensc:0.9.7:*:*:*:*:*:*:*
cpe:2.3:a:opensc-project:opensc:0.4.0:*:*:*:*:*:*:*
cpe:2.3:a:opensc-project:opensc:0.3.5:*:*:*:*:*:*:*
cpe:2.3:a:opensc-project:opensc:0.6.0:*:*:*:*:*:*:*
cpe:2.3:a:opensc-project:opensc:0.9.7:b:*:*:*:*:*:*
cpe:2.3:a:opensc-project:opensc:0.11.12:*:*:*:*:*:*:*
cpe:2.3:a:opensc-project:opensc:0.9.4:*:*:*:*:*:*:*
cpe:2.3:a:opensc-project:opensc:0.11.7:*:*:*:*:*:*:*
cpe:2.3:a:opensc-project:opensc:0.7.0:*:*:*:*:*:*:*
cpe:2.3:a:opensc-project:opensc:0.11.11:*:*:*:*:*:*:*
cpe:2.3:a:opensc-project:opensc:0.10.1:*:*:*:*:*:*:*
cpe:2.3:a:opensc-project:opensc:0.6.1:*:*:*:*:*:*:*
cpe:2.3:a:opensc-project:opensc:0.11.4:*:*:*:*:*:*:*
cpe:2.3:a:opensc-project:opensc:0.5.0:*:*:*:*:*:*:*
cpe:2.3:a:opensc-project:opensc:0.9.3:*:*:*:*:*:*:*
cpe:2.3:a:opensc-project:opensc:0.11.5:*:*:*:*:*:*:*
cpe:2.3:a:opensc-project:opensc:0.9.8:*:*:*:*:*:*:*
cpe:2.3:a:opensc-project:opensc:0.9.7:d:*:*:*:*:*:*
cpe:2.3:a:opensc-project:opensc:0.11.1:*:*:*:*:*:*:*
cpe:2.3:a:opensc-project:opensc:*:*:*:*:*:*:*:* 0.11.13
cpe:2.3:a:opensc-project:opensc:0.8.0.0:*:*:*:*:*:*:*
cpe:2.3:a:opensc-project:opensc:0.9.5:*:*:*:*:*:*:*
cpe:2.3:a:opensc-project:opensc:0.11.6:*:*:*:*:*:*:*
cpe:2.3:a:opensc-project:opensc:0.11.10:*:*:*:*:*:*:*
cpe:2.3:a:opensc-project:opensc:0.11.0:*:*:*:*:*:*:*
cpe:2.3:a:opensc-project:opensc:0.8.1:*:*:*:*:*:*:*
Related information, measures and tools
Common Vulnerabilities List