First published: Tue May 30 2023(Updated: )
A vulnerbility was found in OpenSC. This security flaw cause a buffer overrun vulnerability in pkcs15 cardos_have_verifyrc_package. The attacker can supply a smart card package with malformed ASN1 context. The cardos_have_verifyrc_package function scans the ASN1 buffer for 2 tags, where remaining length is wrongly caculated due to moved starting pointer. This leads to possible heap-based buffer oob read. In cases where ASAN is enabled while compiling this causes a crash. Further info leak or more damage is possible.
Credit: secalert@redhat.com secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Opensc Project Opensc | =0.23.0 | |
Redhat Enterprise Linux | =8.0 | |
Redhat Enterprise Linux | =9.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this OpenSC vulnerability is CVE-2023-2977.
CVE-2023-2977 has a severity rating of 7.1 (high).
The buffer overrun vulnerability in pkcs15 cardos_have_verifyrc_package allows an attacker to supply a smart card package with a malformed ASN1 context, potentially leading to arbitrary code execution or a denial of service.
OpenSC version 0.23.0 is affected by CVE-2023-2977.
To fix the CVE-2023-2977 vulnerability in OpenSC, update to a version that includes the fix provided in the OpenSC GitHub repository pull request.