ID CVE-2019-19480
Summary An issue was discovered in OpenSC through 0.19.0 and 0.20.x through 0.20.0-rc3. libopensc/pkcs15-prkey.c has an incorrect free operation in sc_pkcs15_decode_prkdf_entry.
References
Vulnerable Configurations
  • cpe:2.3:a:opensc_project:opensc:0.2.0:*:*:*:*:*:*:*
    cpe:2.3:a:opensc_project:opensc:0.2.0:*:*:*:*:*:*:*
  • cpe:2.3:a:opensc_project:opensc:0.3.0:*:*:*:*:*:*:*
    cpe:2.3:a:opensc_project:opensc:0.3.0:*:*:*:*:*:*:*
  • cpe:2.3:a:opensc_project:opensc:0.3.1:*:*:*:*:*:*:*
    cpe:2.3:a:opensc_project:opensc:0.3.1:*:*:*:*:*:*:*
  • cpe:2.3:a:opensc_project:opensc:0.12.2:*:*:*:*:*:*:*
    cpe:2.3:a:opensc_project:opensc:0.12.2:*:*:*:*:*:*:*
  • cpe:2.3:a:opensc_project:opensc:0.12.2:rc1:*:*:*:*:*:*
    cpe:2.3:a:opensc_project:opensc:0.12.2:rc1:*:*:*:*:*:*
  • cpe:2.3:a:opensc_project:opensc:0.13.0:*:*:*:*:*:*:*
    cpe:2.3:a:opensc_project:opensc:0.13.0:*:*:*:*:*:*:*
  • cpe:2.3:a:opensc_project:opensc:0.13.0:-:*:*:*:*:*:*
    cpe:2.3:a:opensc_project:opensc:0.13.0:-:*:*:*:*:*:*
  • cpe:2.3:a:opensc_project:opensc:0.13.0:prerelease1:*:*:*:*:*:*
    cpe:2.3:a:opensc_project:opensc:0.13.0:prerelease1:*:*:*:*:*:*
  • cpe:2.3:a:opensc_project:opensc:0.13.0:rc1:*:*:*:*:*:*
    cpe:2.3:a:opensc_project:opensc:0.13.0:rc1:*:*:*:*:*:*
  • cpe:2.3:a:opensc_project:opensc:0.14.0:*:*:*:*:*:*:*
    cpe:2.3:a:opensc_project:opensc:0.14.0:*:*:*:*:*:*:*
  • cpe:2.3:a:opensc_project:opensc:0.14.0:-:*:*:*:*:*:*
    cpe:2.3:a:opensc_project:opensc:0.14.0:-:*:*:*:*:*:*
  • cpe:2.3:a:opensc_project:opensc:0.14.0:rc2:*:*:*:*:*:*
    cpe:2.3:a:opensc_project:opensc:0.14.0:rc2:*:*:*:*:*:*
  • cpe:2.3:a:opensc_project:opensc:0.15.0:*:*:*:*:*:*:*
    cpe:2.3:a:opensc_project:opensc:0.15.0:*:*:*:*:*:*:*
  • cpe:2.3:a:opensc_project:opensc:0.15.0:-:*:*:*:*:*:*
    cpe:2.3:a:opensc_project:opensc:0.15.0:-:*:*:*:*:*:*
  • cpe:2.3:a:opensc_project:opensc:0.15.0:prerelease1:*:*:*:*:*:*
    cpe:2.3:a:opensc_project:opensc:0.15.0:prerelease1:*:*:*:*:*:*
  • cpe:2.3:a:opensc_project:opensc:0.15.0:prerelease2:*:*:*:*:*:*
    cpe:2.3:a:opensc_project:opensc:0.15.0:prerelease2:*:*:*:*:*:*
  • cpe:2.3:a:opensc_project:opensc:0.15.0:prerelease3:*:*:*:*:*:*
    cpe:2.3:a:opensc_project:opensc:0.15.0:prerelease3:*:*:*:*:*:*
  • cpe:2.3:a:opensc_project:opensc:0.16.0:*:*:*:*:*:*:*
    cpe:2.3:a:opensc_project:opensc:0.16.0:*:*:*:*:*:*:*
  • cpe:2.3:a:opensc_project:opensc:0.16.0:-:*:*:*:*:*:*
    cpe:2.3:a:opensc_project:opensc:0.16.0:-:*:*:*:*:*:*
  • cpe:2.3:a:opensc_project:opensc:0.16.0:prerelease1:*:*:*:*:*:*
    cpe:2.3:a:opensc_project:opensc:0.16.0:prerelease1:*:*:*:*:*:*
  • cpe:2.3:a:opensc_project:opensc:0.16.0:rc1:*:*:*:*:*:*
    cpe:2.3:a:opensc_project:opensc:0.16.0:rc1:*:*:*:*:*:*
  • cpe:2.3:a:opensc_project:opensc:0.16.0:rc2:*:*:*:*:*:*
    cpe:2.3:a:opensc_project:opensc:0.16.0:rc2:*:*:*:*:*:*
  • cpe:2.3:a:opensc_project:opensc:0.17.0:*:*:*:*:*:*:*
    cpe:2.3:a:opensc_project:opensc:0.17.0:*:*:*:*:*:*:*
  • cpe:2.3:a:opensc_project:opensc:0.17.0:-:*:*:*:*:*:*
    cpe:2.3:a:opensc_project:opensc:0.17.0:-:*:*:*:*:*:*
  • cpe:2.3:a:opensc_project:opensc:0.17.0:rc1:*:*:*:*:*:*
    cpe:2.3:a:opensc_project:opensc:0.17.0:rc1:*:*:*:*:*:*
  • cpe:2.3:a:opensc_project:opensc:0.17.0:rc2:*:*:*:*:*:*
    cpe:2.3:a:opensc_project:opensc:0.17.0:rc2:*:*:*:*:*:*
  • cpe:2.3:a:opensc_project:opensc:0.18.0:*:*:*:*:*:*:*
    cpe:2.3:a:opensc_project:opensc:0.18.0:*:*:*:*:*:*:*
  • cpe:2.3:a:opensc_project:opensc:0.18.0:-:*:*:*:*:*:*
    cpe:2.3:a:opensc_project:opensc:0.18.0:-:*:*:*:*:*:*
  • cpe:2.3:a:opensc_project:opensc:0.18.0:rc1:*:*:*:*:*:*
    cpe:2.3:a:opensc_project:opensc:0.18.0:rc1:*:*:*:*:*:*
  • cpe:2.3:a:opensc_project:opensc:0.18.0:rc2:*:*:*:*:*:*
    cpe:2.3:a:opensc_project:opensc:0.18.0:rc2:*:*:*:*:*:*
  • cpe:2.3:a:opensc_project:opensc:0.19.0:*:*:*:*:*:*:*
    cpe:2.3:a:opensc_project:opensc:0.19.0:*:*:*:*:*:*:*
  • cpe:2.3:a:opensc_project:opensc:0.19.0:-:*:*:*:*:*:*
    cpe:2.3:a:opensc_project:opensc:0.19.0:-:*:*:*:*:*:*
  • cpe:2.3:a:opensc_project:opensc:0.19.0:rc1:*:*:*:*:*:*
    cpe:2.3:a:opensc_project:opensc:0.19.0:rc1:*:*:*:*:*:*
  • cpe:2.3:a:opensc_project:opensc:0.20.0:rc1:*:*:*:*:*:*
    cpe:2.3:a:opensc_project:opensc:0.20.0:rc1:*:*:*:*:*:*
  • cpe:2.3:a:opensc_project:opensc:0.20.0:rc2:*:*:*:*:*:*
    cpe:2.3:a:opensc_project:opensc:0.20.0:rc2:*:*:*:*:*:*
  • cpe:2.3:a:opensc_project:opensc:0.20.0:rc3:*:*:*:*:*:*
    cpe:2.3:a:opensc_project:opensc:0.20.0:rc3:*:*:*:*:*:*
  • cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*
    cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*
CVSS
Base: 2.1 (as of 24-01-2020 - 19:15)
Impact:
Exploitability:
CWE CWE-672
CAPEC
Access
VectorComplexityAuthentication
LOCAL LOW NONE
Impact
ConfidentialityIntegrityAvailability
NONE NONE PARTIAL
cvss-vector via4 AV:L/AC:L/Au:N/C:N/I:N/A:P
refmap via4
fedora FEDORA-2020-3c93790abe
misc
mlist [oss-security] 20191229 OpenSC 0.20.0 released
Last major update 24-01-2020 - 19:15
Published 01-12-2019 - 23:15
Last modified 24-01-2020 - 19:15
Back to Top