OpenSC 缓冲区错误漏洞

admin 2022-07-26 00:15:25 CNNVD漏洞 来源:ZONE.CI 全球网 0 阅读模式

漏洞信息详情

OpenSC 缓冲区错误漏洞

  • CNNVD编号:CNNVD-201912-003
  • 危害等级: 中危
  • CVE编号: CVE-2019-19479
  • 漏洞类型: 缓冲区错误
  • 发布时间: 2019-12-01
  • 威胁类型: 本地
  • 更新时间: 2022-04-02
  • 厂        商:
  • 漏洞来源: Red Hat

漏洞简介

OpenSC是一款开源的智能卡工具和中间件。

OpenSC 0.19.0及之前版本和0.20.x版本至0.20.0-rc3版本中存在安全漏洞,该漏洞源于libopensc/card-setcos.c文件没有进行正确的读取操作。目前尚无此漏洞的相关信息,请随时关注CNNVD或厂商公告。

漏洞公告

目前厂商已发布升级补丁以修复漏洞,补丁获取链接:

https://github.com/OpenSC/OpenSC/commit/c3f23b836e5a1766c36617fe1da30d22f7b63de2

参考网址

来源:MLIST

链接:https://lists.debian.org/debian-lts-announce/2019/12/msg00031.HTML

来源:MISC

链接:https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=18693

来源:MISC

链接:https://github.com/OpenSC/OpenSC/commit/c3f23b836e5a1766c36617fe1da30d22f7b63de2

来源:MLIST

链接:http://www.openwall.com/lists/oss-security/2019/12/29/1

来源:FEDORA

链接:https://lists.fedoraproject.org/archives/list/[email protected]/message/NDSQLMZZYBHO5X3BK7D6E7E6NZIMZDI5/

来源:MISC

链接:https://bugzilla.redhat.com/show_bug.cgi?id=1782521

来源:MLIST

链接:https://lists.debian.org/debian-lts-announce/2021/11/msg00027.HTML

来源:www.debian.org

链接:https://www.debian.org/lts/security/2019/dla-2046

来源:vigilance.fr

链接:https://vigilance.fr/vulnerability/OpenSC-out-of-bounds-memory-reading-via-SETCOS-File-Attribute-31235

来源:www.auscert.org.au

链接:https://www.auscert.org.au/bulletins/ESB-2020.0026/

来源:www.auscert.org.au

链接:https://www.auscert.org.au/bulletins/ESB-2021.1234

来源:www.auscert.org.au

链接:https://www.auscert.org.au/bulletins/ESB-2021.1117

来源:nvd.nist.gov

链接:https://nvd.nist.gov/vuln/detail/CVE-2019-19479

来源:www.auscert.org.au

链接:https://www.auscert.org.au/bulletins/ESB-2021.4021

来源:packetstormsecurity.com

链接:https://packetstormsecurity.com/files/159830/Red-Hat-Security-Advisory-2020-4483-01.HTML

来源:www.auscert.org.au

链接:https://www.auscert.org.au/bulletins/ESB-2020.3883/

来源:www.auscert.org.au

链接:https://www.auscert.org.au/bulletins/ESB-2022.1402

受影响实体

    暂无


补丁

  • OpenSC 缓冲区错误漏洞的修复措施

weinxin
特别声明
本站(ZONE.CI)所有文章仅供技术研究,若将其信息做其他用途,由用户承担全部法律及连带责任,本站不承担任何法律及连带责任,请遵守中华人民共和国安全法.
评论:0   参与:  0