7.2
CVSSv2

CVE-2010-4523

Published: 07/01/2011 Updated: 17/02/2011
CVSS v2 Base Score: 7.2 | Impact Score: 10 | Exploitability Score: 3.9
VMScore: 641
Vector: AV:L/AC:L/Au:N/C:C/I:C/A:C

Vulnerability Summary

Multiple stack-based buffer overflows in libopensc in OpenSC 0.11.13 and previous versions allow physically proximate malicious users to execute arbitrary code via a long serial-number field on a smart card, related to (1) card-acos5.c, (2) card-atrust-acos.c, and (3) card-starcos.c.

Vulnerable Product Search on Vulmon Subscribe to Product

opensc-project opensc 0.9.5

opensc-project opensc 0.9.4

opensc-project opensc 0.11.3

opensc-project opensc 0.11.2

opensc-project opensc 0.9.7

opensc-project opensc 0.8.1

opensc-project opensc 0.6.0

opensc-project opensc 0.6.1

opensc-project opensc 0.11.4

opensc-project opensc 0.8.0

opensc-project opensc 0.10.0

opensc-project opensc 0.9.8

opensc-project opensc 0.7.0

opensc-project opensc 0.11.7

opensc-project opensc 0.11.8

opensc-project opensc 0.10.1

opensc-project opensc 0.5.0

opensc-project opensc 0.9.6

opensc-project opensc 0.8

opensc-project opensc 0.3.5

opensc-project opensc 0.4.0

opensc-project opensc 0.11.9

opensc-project opensc 0.11.10

opensc-project opensc 0.9.3

opensc-project opensc 0.9.2

opensc-project opensc 0.11.1

opensc-project opensc 0.11.0

opensc-project opensc 0.9

opensc-project opensc 0.8.0.0

opensc-project opensc 0.3.2

opensc-project opensc 0.11.6

opensc-project opensc 0.11.5

opensc-project opensc 0.11.11

opensc-project opensc 0.11.12

opensc-project opensc

Vendor Advisories

Debian Bug report logs - #607427 libopensc: CVE-2010-4523: buffer overflow from rogue cards Package: opensc; Maintainer for opensc is Debian OpenSC Maintainers <pkg-opensc-maint@listsaliothdebianorg>; Source for opensc is src:opensc (PTS, buildd, popcon) Reported by: Alexander Kurtz <kurtzalex@googlemailcom> Dat ...