First published: Wed Dec 22 2010(Updated: )
An integer overflow, leading to array index error was found in the way USB CCID (Chip/Smart Card Interface Devices) driver processed certain values of card serial number. A local attacker could use this flaw to execute arbitrary code, with the privileges of the user running the pcscd daemon, via a malicious smart card with specially-crafted value of its serial number, inserted to the system USB port. References: [1] <a href="http://labs.mwrinfosecurity.com/files/Advisories/mwri_pcsc-libccid-buffer-overflow_2010-12-13.pdf">http://labs.mwrinfosecurity.com/files/Advisories/mwri_pcsc-libccid-buffer-overflow_2010-12-13.pdf</a> [2] <a href="http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=607780">http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=607780</a> Upstream changesets: [3] <a href="http://lists.alioth.debian.org/pipermail/pcsclite-cvs-commit/2010-November/004934.html">http://lists.alioth.debian.org/pipermail/pcsclite-cvs-commit/2010-November/004934.html</a> [4] <a href="http://lists.alioth.debian.org/pipermail/pcsclite-cvs-commit/2010-November/004935.html">http://lists.alioth.debian.org/pipermail/pcsclite-cvs-commit/2010-November/004935.html</a>
Affected Software | Affected Version | How to fix |
---|---|---|
PCSC-lite |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of REDHAT-BUG-664986 is critical due to the potential for arbitrary code execution.
To fix REDHAT-BUG-664986, update the pcscd daemon and related packages to the latest version provided by your distribution.
REDHAT-BUG-664986 is caused by an integer overflow leading to an array index error in the USB CCID driver.
Users running the pcscd daemon, especially those using certain versions of the pcsc-lite package, are affected by REDHAT-BUG-664986.
No, REDHAT-BUG-664986 requires local access for exploitation since it involves the privileges of the user running the pcscd daemon.