Out-of-Bounds Affecting opensc package, versions <0.11.13-1.1


Severity

Recommended
low

Based on Debian security rating.

Threat Intelligence

EPSS
0.28% (69th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk IDSNYK-DEBIANUNSTABLE-OPENSC-282159
  • published7 Jan 2011
  • disclosed7 Jan 2011

Introduced: 7 Jan 2011

CVE-2010-4523  (opens in a new tab)
CWE-119  (opens in a new tab)

How to fix?

Upgrade Debian:unstable opensc to version 0.11.13-1.1 or higher.

NVD Description

Note: Versions mentioned in the description apply only to the upstream opensc package and not the opensc package as distributed by Debian. See How to fix? for Debian:unstable relevant fixed versions and status.

Multiple stack-based buffer overflows in libopensc in OpenSC 0.11.13 and earlier allow physically proximate attackers to execute arbitrary code via a long serial-number field on a smart card, related to (1) card-acos5.c, (2) card-atrust-acos.c, and (3) card-starcos.c.

CVSS Scores

version 3.1