7.5
CVSSv3

CVE-2019-16058

Published: 06/09/2019 Updated: 12/09/2019
CVSS v2 Base Score: 5 | Impact Score: 2.9 | Exploitability Score: 10
CVSS v3 Base Score: 7.5 | Impact Score: 3.6 | Exploitability Score: 3.9
VMScore: 445
Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P

Vulnerability Summary

An issue exists in the pam_p11 component 0.2.0 and 0.3.0 for OpenSC. If a smart card creates a signature with a length longer than 256 bytes, this triggers a buffer overflow. This may be the case for RSA keys with 4096 bits depending on the signature scheme.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

opensc project opensc 0.3.0

opensc project opensc 0.2.0

Vendor Advisories

Debian Bug report logs - #939664 pam-p11: CVE-2019-16058 Package: src:pam-p11; Maintainer for src:pam-p11 is Debian OpenSC Maintainers <pkg-opensc-maint@listsaliothdebianorg>; Reported by: Salvatore Bonaccorso <carnil@debianorg> Date: Sat, 7 Sep 2019 13:15:05 UTC Severity: important Tags: security, upstream Fou ...

Mailing Lists

Hi all! I'm happy to announce the new pam_p11 release 031, which can be found here githubcom/OpenSC/pam_p11/releases/tag/pam_p11-031 <githubcom/OpenSC/pam_p11/releases/tag/pam_p11-031> This release fixes a buffer overflow when creating signatures longer than 256 bytes (CVE-2019-16058) This bug is present in pam_p11 ...