CVE-2024-8443
Oct. 1, 2024, 1:15 p.m.
Tags
CVSS Score
Products Impacted
Vendor | Product | Versions |
---|---|---|
opensc_project |
|
|
redhat |
|
|
Description
A heap-based buffer overflow vulnerability was found in the libopensc OpenPGP driver. A crafted USB device or smart card with malicious responses to the APDUs during the card enrollment process using the `pkcs15-init` tool may lead to out-of-bound rights, possibly resulting in arbitrary code execution.
Weaknesses
CWE-122
Heap-based Buffer Overflow
A heap overflow condition is a buffer overflow, where the buffer that can be overwritten is allocated in the heap portion of memory, generally meaning that the buffer was allocated using a routine such as malloc().
CWE ID: 122CWE-787
Out-of-bounds Write
The product writes data past the end, or before the beginning, of the intended buffer.
CWE ID: 787Date
Published: Sept. 10, 2024, 2:15 p.m.
Last Modified: Oct. 1, 2024, 1:15 p.m.
Status : Modified
CVE has been recently published to the CVE List and has been received by the NVD.
More infoSource
secalert@redhat.com
CPEs
Type | Vendor | Product | Version | Update | Edition | Language | Software Edition | Target Software | Target Hardware | Other Information |
---|---|---|---|---|---|---|---|---|---|---|
a | opensc_project | opensc | - | / | / | / | / | / | / | / |
o | redhat | enterprise_linux | 7.0 | / | / | / | / | / | / | / |
o | redhat | enterprise_linux | 8.0 | / | / | / | / | / | / | / |
o | redhat | enterprise_linux | 9.0 | / | / | / | / | / | / | / |
CVSS Data
Attack Vector
PHYSICAL
Attack Complexity
HIGH
Privileges Required
NONE
Scope
UNCHANGED
Confidentiality Impact
LOW
Integrity Impact
LOW
Availability Impact
NONE
Base Score
Exploitability Score
Impact Score
Base Severity
LOWCVSS Vector String
The CVSS vector string provides an in-depth view of the vulnerability metrics.
View Vector StringCVSS:3.1/AV:P/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N