Opensc-project

Opensc

5 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
Exploit
  • EPSS 0.26%
  • Veröffentlicht 07.01.2011 20:00:04
  • Zuletzt bearbeitet 11.04.2025 00:51:21

Multiple stack-based buffer overflows in libopensc in OpenSC 0.11.13 and earlier allow physically proximate attackers to execute arbitrary code via a long serial-number field on a smart card, related to (1) card-acos5.c, (2) card-atrust-acos.c, and (...

  • EPSS 1.05%
  • Veröffentlicht 11.05.2009 16:30:00
  • Zuletzt bearbeitet 09.04.2025 00:30:58

src/tools/pkcs11-tool.c in pkcs11-tool in OpenSC 0.11.7, when used with unspecified third-party PKCS#11 modules, generates RSA keys with incorrect public exponents, which allows attackers to read the cleartext form of messages that were intended to b...

Exploit
  • EPSS 0.31%
  • Veröffentlicht 02.03.2009 22:30:00
  • Zuletzt bearbeitet 09.04.2025 00:30:58

OpenSC before 0.11.7 allows physically proximate attackers to bypass intended PIN requirements and read private data objects via a (1) low level APDU command or (2) debugging tool, as demonstrated by reading the 4601 or 4701 file with the opensc-expl...

  • EPSS 0.11%
  • Veröffentlicht 11.09.2008 01:13:47
  • Zuletzt bearbeitet 09.04.2025 00:30:58

pkcs15-tool in OpenSC before 0.11.6 does not apply security updates to a smart card unless the card's label matches the "OpenSC" string, which might allow physically proximate attackers to exploit vulnerabilities that the card owner expected were pat...

  • EPSS 0.07%
  • Veröffentlicht 01.08.2008 14:41:00
  • Zuletzt bearbeitet 09.04.2025 00:30:58

OpenSC before 0.11.5 uses weak permissions (ADMIN file control information of 00) for the 5015 directory on smart cards and USB crypto tokens running Siemens CardOS M4, which allows physically proximate attackers to change the PIN.