|
|
Subscribe / Log in / New account

pcsc-lite: arbitrary code execution

Package(s):pcsc-lite CVE #(s):CVE-2010-4531
Created:January 14, 2011 Updated:January 22, 2014
Description: From the Red Hat bugzilla:

A stack-based buffer overflow flaw was found in the way PC/SC Lite smart card framework decoded certain attribute values of the Answer-to-Reset (ATR) message, received back from the card after connecting. A local attacker could use this flaw to execute arbitrary code with the privileges of the user running the pcscd daemon, via a malicious smart card inserted to the system USB port.

Alerts:
Gentoo 201401-17 pcsc-lite 2014-01-21
CentOS CESA-2013:0525 pcsc-lite 2013-03-09
Scientific Linux SL-pcsc-20130228 pcsc-lite 2013-02-28
Oracle ELSA-2013-0525 pcsc-lite 2013-02-25
Red Hat RHSA-2013:0525-02 pcsc-lite 2013-02-21
SUSE SUSE-SR:2011:003 gnutls, tomcat6, perl-CGI-Simple, pcsc-lite, obs-server, dhcp, java-1_6_0-openjdk, opera 2011-02-08
Ubuntu USN-1125-1 pcsc-lite 2011-04-27
Pardus 2011-24 pcsc-lite 2011-02-02
openSUSE openSUSE-SU-2011:0092-1 pcsc-ccid pcsc-lite 2011-02-02
Debian DSA-2156-1 pcscd 2011-01-31
Mandriva MDVSA-2011:015 pcsc-lite 2011-01-20
Fedora FEDORA-2011-0164 pcsc-lite 2011-01-05
Fedora FEDORA-2011-0123 pcsc-lite 2011-01-05

to post comments


Copyright © 2025, Eklektix, Inc.
Comments and public postings are copyrighted by their creators.
Linux is a registered trademark of Linus Torvalds