Multiple vulnerabilities in OpenSC



| Updated: 2022-08-05
Risk Low
Patch available YES
Number of vulnerabilities 5
CVE-ID CVE-2021-42778
CVE-2021-42779
CVE-2021-42781
CVE-2021-42782
CVE-2021-42780
CWE-ID CWE-415
CWE-416
CWE-122
CWE-121
CWE-252
Exploitation vector Local
Public exploit N/A
Vulnerable software
OpenSC
Universal components / Libraries / Libraries used by multiple products

Vendor OpenSC

Security Bulletin

This security bulletin contains information about 5 vulnerabilities.

1) Double Free

EUVDB-ID: #VU66143

Risk: Low

CVSSv4.0: 0.4 [CVSS:4.0/AV:P/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2021-42778

CWE-ID: CWE-415 - Double Free

Exploit availability: No

Description

The vulnerability allows an attacker with physical access to perform a denial of service attack.

The vulnerability exists due to a boundary error. An attacker with physical access can pass specially crafted data to the application, trigger double free error, and perform a denial of service attack.

Mitigation

Install updates from vendor's website.

Vulnerable software versions

OpenSC: 0.2.0 - 0.21.0

CPE2.3 External links

https://bugzilla.redhat.com/show_bug.cgi?id=2016083
https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=28185
https://github.com/OpenSC/OpenSC/commit/f015746d


Q & A

Can this vulnerability be exploited remotely?

No. The attacker should have physical access to the system in order to successfully exploit this vulnerability.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

2) Use-after-free

EUVDB-ID: #VU66142

Risk: Low

CVSSv4.0: 0.1 [CVSS:4.0/AV:P/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2021-42779

CWE-ID: CWE-416 - Use After Free

Exploit availability: No

Description

The vulnerability allows an attacker with physical access to perform a denial of service attack.

The vulnerability exists due to a use-after-free error in Opensc in sc_file_valid. An attacker with physical access can trigger use-after-free to perform a denial of service attack.

Mitigation

Install updates from vendor's website.

Vulnerable software versions

OpenSC: 0.2.0 - 0.21.0

CPE2.3 External links

https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=28843
https://bugzilla.redhat.com/show_bug.cgi?id=2016086
https://github.com/OpenSC/OpenSC/commit/1db88374


Q & A

Can this vulnerability be exploited remotely?

No. The attacker should have physical access to the system in order to successfully exploit this vulnerability.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

3) Heap-based buffer overflow

EUVDB-ID: #VU66141

Risk: Low

CVSSv4.0: 0.1 [CVSS:4.0/AV:P/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2021-42781

CWE-ID: CWE-122 - Heap-based Buffer Overflow

Exploit availability: No

Description

The vulnerability allows an attacker with physical access to perform denial of service attack.

The vulnerability exists due to a boundary error in Opensc before in pkcs15-oberthur.c. An attacker with physical access can pass specially crafted data to the application, trigger a heap-based buffer overflow and perform denial of service attack.

Mitigation

Install updates from vendor's website.

Vulnerable software versions

OpenSC: 0.2.0 - 0.21.0

CPE2.3 External links

https://bugzilla.redhat.com/show_bug.cgi?id=2016439
https://github.com/OpenSC/OpenSC/commit/17d8980c
https://github.com/OpenSC/OpenSC/commit/5d4daf6c
https://github.com/OpenSC/OpenSC/commit/40c50a3a
https://github.com/OpenSC/OpenSC/commit/05648b06
https://github.com/OpenSC/OpenSC/commit/cae5c71f


Q & A

Can this vulnerability be exploited remotely?

No. The attacker should have physical access to the system in order to successfully exploit this vulnerability.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

4) Stack-based buffer overflow

EUVDB-ID: #VU66137

Risk: Low

CVSSv4.0: 0.4 [CVSS:4.0/AV:P/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2021-42782

CWE-ID: CWE-121 - Stack-based buffer overflow

Exploit availability: No

Description

The vulnerability allows an attacker with physical access to perform a denial of service attack.

The vulnerability exists due to a boundary error in Opensc in various places. An attacker with physical access can trigger stack-based buffer overflow and perform a denial of service attack.

Mitigation

Install updates from vendor's website.

Vulnerable software versions

OpenSC: 0.2.0 - 0.21.0

CPE2.3 External links

https://github.com/OpenSC/OpenSC/commit/1252aca9
https://github.com/OpenSC/OpenSC/commit/7114fb71
https://github.com/OpenSC/OpenSC/commit/78cdab94
https://github.com/OpenSC/OpenSC/commit/ae1cf0be
https://github.com/OpenSC/OpenSC/commit/456ac566
https://bugzilla.redhat.com/show_bug.cgi?id=2016448


Q & A

Can this vulnerability be exploited remotely?

No. The attacker should have physical access to the system in order to successfully exploit this vulnerability.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

5) Unchecked Return Value

EUVDB-ID: #VU66136

Risk: Low

CVSSv4.0: 0.4 [CVSS:4.0/AV:P/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2021-42780

CWE-ID: CWE-252 - Unchecked Return Value

Exploit availability: No

Description

The vulnerability allows an attacker with physical access to perform denial of service attacks.

The vulnerability exists due to use after return issue in insert_pin() function in  Opensc. An attacker with physical access can trigger the vulnerability to perform denial of service attacks.

Mitigation

Install updates from vendor's website.

Vulnerable software versions

OpenSC: 0.2.0 - 0.21.0

CPE2.3 External links

https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=28383
https://github.com/OpenSC/OpenSC/commit/5df913b7
https://bugzilla.redhat.com/show_bug.cgi?id=2016139


Q & A

Can this vulnerability be exploited remotely?

No. The attacker should have physical access to the system in order to successfully exploit this vulnerability.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.



###SIDEBAR###