ID CVE-2020-26570
Summary The Oberthur smart card software driver in OpenSC before 0.21.0-rc1 has a heap-based buffer overflow in sc_oberthur_read_file.
References
Vulnerable Configurations
  • cpe:2.3:a:opensc_project:opensc:0.2.0:*:*:*:*:*:*:*
    cpe:2.3:a:opensc_project:opensc:0.2.0:*:*:*:*:*:*:*
  • cpe:2.3:a:opensc_project:opensc:0.3.0:*:*:*:*:*:*:*
    cpe:2.3:a:opensc_project:opensc:0.3.0:*:*:*:*:*:*:*
  • cpe:2.3:a:opensc_project:opensc:0.3.1:*:*:*:*:*:*:*
    cpe:2.3:a:opensc_project:opensc:0.3.1:*:*:*:*:*:*:*
  • cpe:2.3:a:opensc_project:opensc:0.12.2:*:*:*:*:*:*:*
    cpe:2.3:a:opensc_project:opensc:0.12.2:*:*:*:*:*:*:*
  • cpe:2.3:a:opensc_project:opensc:0.12.2:rc1:*:*:*:*:*:*
    cpe:2.3:a:opensc_project:opensc:0.12.2:rc1:*:*:*:*:*:*
  • cpe:2.3:a:opensc_project:opensc:0.13.0:*:*:*:*:*:*:*
    cpe:2.3:a:opensc_project:opensc:0.13.0:*:*:*:*:*:*:*
  • cpe:2.3:a:opensc_project:opensc:0.13.0:-:*:*:*:*:*:*
    cpe:2.3:a:opensc_project:opensc:0.13.0:-:*:*:*:*:*:*
  • cpe:2.3:a:opensc_project:opensc:0.13.0:prerelease1:*:*:*:*:*:*
    cpe:2.3:a:opensc_project:opensc:0.13.0:prerelease1:*:*:*:*:*:*
  • cpe:2.3:a:opensc_project:opensc:0.13.0:rc1:*:*:*:*:*:*
    cpe:2.3:a:opensc_project:opensc:0.13.0:rc1:*:*:*:*:*:*
  • cpe:2.3:a:opensc_project:opensc:0.14.0:*:*:*:*:*:*:*
    cpe:2.3:a:opensc_project:opensc:0.14.0:*:*:*:*:*:*:*
  • cpe:2.3:a:opensc_project:opensc:0.14.0:-:*:*:*:*:*:*
    cpe:2.3:a:opensc_project:opensc:0.14.0:-:*:*:*:*:*:*
  • cpe:2.3:a:opensc_project:opensc:0.14.0:rc2:*:*:*:*:*:*
    cpe:2.3:a:opensc_project:opensc:0.14.0:rc2:*:*:*:*:*:*
  • cpe:2.3:a:opensc_project:opensc:0.15.0:*:*:*:*:*:*:*
    cpe:2.3:a:opensc_project:opensc:0.15.0:*:*:*:*:*:*:*
  • cpe:2.3:a:opensc_project:opensc:0.15.0:-:*:*:*:*:*:*
    cpe:2.3:a:opensc_project:opensc:0.15.0:-:*:*:*:*:*:*
  • cpe:2.3:a:opensc_project:opensc:0.15.0:prerelease1:*:*:*:*:*:*
    cpe:2.3:a:opensc_project:opensc:0.15.0:prerelease1:*:*:*:*:*:*
  • cpe:2.3:a:opensc_project:opensc:0.15.0:prerelease2:*:*:*:*:*:*
    cpe:2.3:a:opensc_project:opensc:0.15.0:prerelease2:*:*:*:*:*:*
  • cpe:2.3:a:opensc_project:opensc:0.15.0:prerelease3:*:*:*:*:*:*
    cpe:2.3:a:opensc_project:opensc:0.15.0:prerelease3:*:*:*:*:*:*
  • cpe:2.3:a:opensc_project:opensc:0.16.0:*:*:*:*:*:*:*
    cpe:2.3:a:opensc_project:opensc:0.16.0:*:*:*:*:*:*:*
  • cpe:2.3:a:opensc_project:opensc:0.16.0:-:*:*:*:*:*:*
    cpe:2.3:a:opensc_project:opensc:0.16.0:-:*:*:*:*:*:*
  • cpe:2.3:a:opensc_project:opensc:0.16.0:prerelease1:*:*:*:*:*:*
    cpe:2.3:a:opensc_project:opensc:0.16.0:prerelease1:*:*:*:*:*:*
  • cpe:2.3:a:opensc_project:opensc:0.16.0:rc1:*:*:*:*:*:*
    cpe:2.3:a:opensc_project:opensc:0.16.0:rc1:*:*:*:*:*:*
  • cpe:2.3:a:opensc_project:opensc:0.16.0:rc2:*:*:*:*:*:*
    cpe:2.3:a:opensc_project:opensc:0.16.0:rc2:*:*:*:*:*:*
  • cpe:2.3:a:opensc_project:opensc:0.17.0:*:*:*:*:*:*:*
    cpe:2.3:a:opensc_project:opensc:0.17.0:*:*:*:*:*:*:*
  • cpe:2.3:a:opensc_project:opensc:0.17.0:-:*:*:*:*:*:*
    cpe:2.3:a:opensc_project:opensc:0.17.0:-:*:*:*:*:*:*
  • cpe:2.3:a:opensc_project:opensc:0.17.0:rc1:*:*:*:*:*:*
    cpe:2.3:a:opensc_project:opensc:0.17.0:rc1:*:*:*:*:*:*
  • cpe:2.3:a:opensc_project:opensc:0.17.0:rc2:*:*:*:*:*:*
    cpe:2.3:a:opensc_project:opensc:0.17.0:rc2:*:*:*:*:*:*
  • cpe:2.3:a:opensc_project:opensc:0.18.0:*:*:*:*:*:*:*
    cpe:2.3:a:opensc_project:opensc:0.18.0:*:*:*:*:*:*:*
  • cpe:2.3:a:opensc_project:opensc:0.18.0:-:*:*:*:*:*:*
    cpe:2.3:a:opensc_project:opensc:0.18.0:-:*:*:*:*:*:*
  • cpe:2.3:a:opensc_project:opensc:0.18.0:rc1:*:*:*:*:*:*
    cpe:2.3:a:opensc_project:opensc:0.18.0:rc1:*:*:*:*:*:*
  • cpe:2.3:a:opensc_project:opensc:0.18.0:rc2:*:*:*:*:*:*
    cpe:2.3:a:opensc_project:opensc:0.18.0:rc2:*:*:*:*:*:*
  • cpe:2.3:a:opensc_project:opensc:0.19.0:*:*:*:*:*:*:*
    cpe:2.3:a:opensc_project:opensc:0.19.0:*:*:*:*:*:*:*
  • cpe:2.3:a:opensc_project:opensc:0.19.0:-:*:*:*:*:*:*
    cpe:2.3:a:opensc_project:opensc:0.19.0:-:*:*:*:*:*:*
  • cpe:2.3:a:opensc_project:opensc:0.19.0:rc1:*:*:*:*:*:*
    cpe:2.3:a:opensc_project:opensc:0.19.0:rc1:*:*:*:*:*:*
  • cpe:2.3:a:opensc_project:opensc:0.20.0:-:*:*:*:*:*:*
    cpe:2.3:a:opensc_project:opensc:0.20.0:-:*:*:*:*:*:*
  • cpe:2.3:a:opensc_project:opensc:0.20.0:rc1:*:*:*:*:*:*
    cpe:2.3:a:opensc_project:opensc:0.20.0:rc1:*:*:*:*:*:*
  • cpe:2.3:a:opensc_project:opensc:0.20.0:rc2:*:*:*:*:*:*
    cpe:2.3:a:opensc_project:opensc:0.20.0:rc2:*:*:*:*:*:*
  • cpe:2.3:a:opensc_project:opensc:0.20.0:rc3:*:*:*:*:*:*
    cpe:2.3:a:opensc_project:opensc:0.20.0:rc3:*:*:*:*:*:*
  • cpe:2.3:o:fedoraproject:fedora:33:*:*:*:*:*:*:*
    cpe:2.3:o:fedoraproject:fedora:33:*:*:*:*:*:*:*
  • cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
    cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
CVSS
Base: 2.1 (as of 29-11-2021 - 17:30)
Impact:
Exploitability:
CWE CWE-787
CAPEC
Access
VectorComplexityAuthentication
LOCAL LOW NONE
Impact
ConfidentialityIntegrityAvailability
NONE NONE PARTIAL
cvss-vector via4 AV:L/AC:L/Au:N/C:N/I:N/A:P
refmap via4
fedora FEDORA-2020-7c80831ffe
misc
mlist [oss-security] 20201124 OpenSC 0.21.0 released
Last major update 29-11-2021 - 17:30
Published 06-10-2020 - 02:15
Last modified 29-11-2021 - 17:30
Back to Top