5
CVSSv2

CVE-2019-16058

Published: 06/09/2019 Updated: 12/09/2019
CVSS v2 Base Score: 5 | Impact Score: 2.9 | Exploitability Score: 10
CVSS v3 Base Score: 7.5 | Impact Score: 3.6 | Exploitability Score: 3.9
VMScore: 445
Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P

Vulnerability Summary

An issue exists in the pam_p11 component 0.2.0 and 0.3.0 for OpenSC. If a smart card creates a signature with a length longer than 256 bytes, this triggers a buffer overflow. This may be the case for RSA keys with 4096 bits depending on the signature scheme.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

opensc project opensc 0.3.0

opensc project opensc 0.2.0

Vendor Advisories

Debian Bug report logs - #939664 pam-p11: CVE-2019-16058 Package: src:pam-p11; Maintainer for src:pam-p11 is Debian OpenSC Maintainers <pkg-opensc-maint@listsaliothdebianorg>; Reported by: Salvatore Bonaccorso <carnil@debianorg> Date: Sat, 7 Sep 2019 13:15:05 UTC Severity: important Tags: security, upstream Fou ...