First published: Mon Mar 02 2009(Updated: )
OpenSC before 0.11.7 allows physically proximate attackers to bypass intended PIN requirements and read private data objects via a (1) low level APDU command or (2) debugging tool, as demonstrated by reading the 4601 or 4701 file with the opensc-explorer or opensc-tool program.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Opensc-project Opensc | =0.11.3-pre3 | |
Opensc-project Opensc | =0.11.3 | |
Opensc-project Opensc | =0.9 | |
Opensc-project Opensc | =0.8 | |
Opensc-project Opensc | =0.9.6 | |
Opensc-project Opensc | =0.10.0 | |
Opensc-project Opensc | =0.9.2 | |
Opensc-project Opensc | =0.8.0 | |
Opensc-project Opensc | =0.3.2 | |
Opensc-project Opensc | =0.11.2 | |
Opensc-project Opensc | =0.9.7 | |
Opensc-project Opensc | =0.4.0 | |
Opensc-project Opensc | =0.3.5 | |
Opensc-project Opensc | =0.6.0 | |
Opensc-project Opensc | =0.9.7-b | |
Opensc-project Opensc | =0.9.4 | |
Opensc-project Opensc | =0.7.0 | |
Opensc-project Opensc | <=0.11.6 | |
Opensc-project Opensc | =0.10.1 | |
Opensc-project Opensc | =0.6.1 | |
Opensc-project Opensc | =0.11.4 | |
Opensc-project Opensc | =0.5.0 | |
Opensc-project Opensc | =0.9.3 | |
Opensc-project Opensc | =0.11.5 | |
Opensc-project Opensc | =0.9.8 | |
Opensc-project Opensc | =0.9.7-d | |
Opensc-project Opensc | =0.11.1 | |
Opensc-project Opensc | =0.8.0.0 | |
Opensc-project Opensc | =0.9.5 | |
Opensc-project Opensc | =0.11.0 | |
Opensc-project Opensc | =0.8.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.