Multiple stack-based buffer overflows in libopensc in OpenSC 0.11.13 and previous versions allow physically proximate malicious users to execute arbitrary code via a long serial-number field on a smart card, related to (1) card-acos5.c, (2) card-atrust-acos.c, and (3) card-starcos.c.
Vulnerable Product | Search on Vulmon | Subscribe to Product |
---|---|---|
opensc-project opensc 0.9.5 |
||
opensc-project opensc 0.9.4 |
||
opensc-project opensc 0.11.3 |
||
opensc-project opensc 0.11.2 |
||
opensc-project opensc 0.9.7 |
||
opensc-project opensc 0.8.1 |
||
opensc-project opensc 0.6.0 |
||
opensc-project opensc 0.6.1 |
||
opensc-project opensc 0.11.4 |
||
opensc-project opensc 0.8.0 |
||
opensc-project opensc 0.10.0 |
||
opensc-project opensc 0.9.8 |
||
opensc-project opensc 0.7.0 |
||
opensc-project opensc 0.11.7 |
||
opensc-project opensc 0.11.8 |
||
opensc-project opensc 0.10.1 |
||
opensc-project opensc 0.5.0 |
||
opensc-project opensc 0.9.6 |
||
opensc-project opensc 0.8 |
||
opensc-project opensc 0.3.5 |
||
opensc-project opensc 0.4.0 |
||
opensc-project opensc 0.11.9 |
||
opensc-project opensc 0.11.10 |
||
opensc-project opensc 0.9.3 |
||
opensc-project opensc 0.9.2 |
||
opensc-project opensc 0.11.1 |
||
opensc-project opensc 0.11.0 |
||
opensc-project opensc 0.9 |
||
opensc-project opensc 0.8.0.0 |
||
opensc-project opensc 0.3.2 |
||
opensc-project opensc 0.11.6 |
||
opensc-project opensc 0.11.5 |
||
opensc-project opensc 0.11.11 |
||
opensc-project opensc 0.11.12 |
||
opensc-project opensc |