First published: Mon Feb 12 2024(Updated: )
The Use After Free vulnerability was identified within the AuthentIC driver in OpenSC packages, particularly in the card enrollment process using pkcs15-init when a user or administrator enrolls or modifies cards. An attacker must have physical access to the computer system to take advantage of this flaw. The attack requires a crafted USB device or smart card to present the system with specially crafted responses to the APDUs, which are considered high complexity and low severity. This manipulation can potentially allow for compromising card management operations during enrollment. Originally reported by OSS-fuzz automated service.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
SUSE OpenSC | <0.25.0 | |
Fedora | =38 | |
Fedora | =39 | |
Fedora | =40 | |
Red Hat Enterprise Linux | =7.0 | |
Red Hat Enterprise Linux | =8.0 | |
Red Hat Enterprise Linux | =9.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-1454 is classified as a Use After Free vulnerability, posing a serious risk if exploited.
To fix CVE-2024-1454, you should update to the latest patched version of OpenSC or the applicable Red Hat Enterprise Linux release.
CVE-2024-1454 affects OpenSC versions below 0.25.0 and specific versions of Fedora and Red Hat Enterprise Linux.
CVE-2024-1454 requires physical access to the affected system for an attacker to exploit it.
Exploitation of CVE-2024-1454 could allow an attacker to execute arbitrary code, compromising system security.