Risk | Low |
Patch available | YES |
Number of vulnerabilities | 13 |
CVE-ID | CVE-2021-42780 CVE-2021-42782 CVE-2023-2977 CVE-2023-40660 CVE-2023-40661 CVE-2023-5992 CVE-2024-45615 CVE-2024-45616 CVE-2024-45617 CVE-2024-45618 CVE-2024-45620 CVE-2024-45619 CVE-2024-8443 |
CWE-ID | CWE-252 CWE-121 CWE-125 CWE-285 CWE-119 CWE-310 CWE-909 CWE-908 CWE-122 |
Exploitation vector | Network |
Public exploit | N/A |
Vulnerable software |
Ubuntu Operating systems & Components / Operating system opensc-pkcs11 (Ubuntu package) Operating systems & Components / Operating system package or component opensc (Ubuntu package) Operating systems & Components / Operating system package or component |
Vendor | Canonical Ltd. |
Security Bulletin
This security bulletin contains information about 13 vulnerabilities.
EUVDB-ID: #VU66136
Risk: Low
CVSSv4.0: 0.4 [CVSS:4.0/AV:P/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2021-42780
CWE-ID:
CWE-252 - Unchecked Return Value
Exploit availability: No
DescriptionThe vulnerability allows an attacker with physical access to perform denial of service attacks.
The vulnerability exists due to use after return issue in insert_pin() function in Opensc. An attacker with physical access can trigger the vulnerability to perform denial of service attacks.
MitigationUpdate the affected package opensc to the latest version.
Vulnerable software versionsUbuntu: 16.04 - 20.04
opensc-pkcs11 (Ubuntu package): before Ubuntu Pro
opensc (Ubuntu package): before Ubuntu Pro
CPE2.3https://ubuntu.com/security/notices/USN-7346-2
Q & A
Can this vulnerability be exploited remotely?
No. The attacker should have physical access to the system in order to successfully exploit this vulnerability.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU66137
Risk: Low
CVSSv4.0: 0.4 [CVSS:4.0/AV:P/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2021-42782
CWE-ID:
CWE-121 - Stack-based buffer overflow
Exploit availability: No
DescriptionThe vulnerability allows an attacker with physical access to perform a denial of service attack.
The vulnerability exists due to a boundary error in Opensc in various places. An attacker with physical access can trigger stack-based buffer overflow and perform a denial of service attack.
MitigationUpdate the affected package opensc to the latest version.
Vulnerable software versionsUbuntu: 16.04 - 20.04
opensc-pkcs11 (Ubuntu package): before Ubuntu Pro
opensc (Ubuntu package): before Ubuntu Pro
CPE2.3https://ubuntu.com/security/notices/USN-7346-2
Q & A
Can this vulnerability be exploited remotely?
No. The attacker should have physical access to the system in order to successfully exploit this vulnerability.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU77320
Risk: Low
CVSSv4.0: 1.1 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:L/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2023-2977
CWE-ID:
CWE-125 - Out-of-bounds read
Exploit availability: No
DescriptionThe vulnerability allows a local user to gain access to potentially sensitive information.
The vulnerability exists due to a boundary condition within the cardos_have_verifyrc_package() function in pkcs15 cardos_have_verifyrc_package. A local user can pass a smart card package with malformed ASN1 context to the application, trigger an out-of-bounds read error and read contents of memory on the system.
MitigationUpdate the affected package opensc to the latest version.
Vulnerable software versionsUbuntu: 16.04 - 20.04
opensc-pkcs11 (Ubuntu package): before Ubuntu Pro
opensc (Ubuntu package): before Ubuntu Pro
CPE2.3https://ubuntu.com/security/notices/USN-7346-2
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU82973
Risk: Low
CVSSv4.0: 4 [CVSS:4.0/AV:P/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2023-40660
CWE-ID:
CWE-285 - Improper Authorization
Exploit availability: No
DescriptionThe vulnerability allows an attacker to bypass authorization process.
The vulnerability exists due to a logic error in the authorization process. When a token/card is authenticated by one process, it can perform cryptographic operations in other processes when an empty zero-length pin is passed. An attacker with physical proximity to the system can bypass the OS logon/screen for small permanently connected tokens to computers.
MitigationUpdate the affected package opensc to the latest version.
Vulnerable software versionsUbuntu: 16.04 - 20.04
opensc-pkcs11 (Ubuntu package): before Ubuntu Pro
opensc (Ubuntu package): before Ubuntu Pro
CPE2.3https://ubuntu.com/security/notices/USN-7346-2
Q & A
Can this vulnerability be exploited remotely?
No. The attacker should have physical access to the system in order to successfully exploit this vulnerability.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU82974
Risk: Low
CVSSv4.0: 4 [CVSS:4.0/AV:P/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2023-40661
CWE-ID:
CWE-119 - Memory corruption
Exploit availability: No
DescriptionThe vulnerability allows an attacker to execute arbitrary code on the target system.
The vulnerability exists due to a boundary error in the card enrollment process using pkcs15-init when a user or administrator enrolls cards. An attacker with physical access to the system can trigger memory corruption and execute arbitrary code with elevated privileges.
Update the affected package opensc to the latest version.
Vulnerable software versionsUbuntu: 16.04 - 20.04
opensc-pkcs11 (Ubuntu package): before Ubuntu Pro
opensc (Ubuntu package): before Ubuntu Pro
CPE2.3https://ubuntu.com/security/notices/USN-7346-2
Q & A
Can this vulnerability be exploited remotely?
No. The attacker should have physical access to the system in order to successfully exploit this vulnerability.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU86937
Risk: Low
CVSSv4.0: 1.7 [CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2023-5992
CWE-ID:
CWE-310 - Cryptographic Issues
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to gain access to sensitive information.
The vulnerability exists due to the PKCS#1 encryption padding removal is not implemented as side-channel resistant. A remote attacker can gain access to sensitive data.
Update the affected package opensc to the latest version.
Vulnerable software versionsUbuntu: 16.04 - 20.04
opensc-pkcs11 (Ubuntu package): before Ubuntu Pro
opensc (Ubuntu package): before Ubuntu Pro
CPE2.3https://ubuntu.com/security/notices/USN-7346-2
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU98501
Risk: Low
CVSSv4.0: 0.4 [CVSS:4.0/AV:P/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-45615
CWE-ID:
CWE-909 - Missing initialization of resource
Exploit availability: No
DescriptionThe vulnerability allows an attacker to escalate privileges on the system.
The vulnerability exists due to missing initialization in OpenSC, OpenSC tools, PKCS#11 module, minidriver, and CTK. An attacker with physical access to the system can use a crafted USB Device or Smart Card, which would present the system with a specially crafted response to APDUs. When buffers are partially filled with data, initialized parts of the buffer can be incorrectly accessed.
MitigationUpdate the affected package opensc to the latest version.
Vulnerable software versionsUbuntu: 16.04 - 20.04
opensc-pkcs11 (Ubuntu package): before Ubuntu Pro
opensc (Ubuntu package): before Ubuntu Pro
CPE2.3https://ubuntu.com/security/notices/USN-7346-2
Q & A
Can this vulnerability be exploited remotely?
No. The attacker should have physical access to the system in order to successfully exploit this vulnerability.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU98502
Risk: Low
CVSSv4.0: 0.4 [CVSS:4.0/AV:P/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-45616
CWE-ID:
CWE-908 - Use of Uninitialized Resource
Exploit availability: No
DescriptionThe vulnerability allows an attacker to bypass certain security restrictions.
The vulnerability exists due to usage of uninitialized resources in OpenSC, OpenSC tools, PKCS#11 module, minidriver, and CTK. An attacker with physical access to the system can use a crafted USB Device or Smart Card, which would present the system with a specially crafted response to APDUs. When buffers are partially filled with data, initialized parts of the buffer can be incorrectly accessed.
MitigationUpdate the affected package opensc to the latest version.
Vulnerable software versionsUbuntu: 16.04 - 20.04
opensc-pkcs11 (Ubuntu package): before Ubuntu Pro
opensc (Ubuntu package): before Ubuntu Pro
CPE2.3https://ubuntu.com/security/notices/USN-7346-2
Q & A
Can this vulnerability be exploited remotely?
No. The attacker should have physical access to the system in order to successfully exploit this vulnerability.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU98503
Risk: Low
CVSSv4.0: 0.4 [CVSS:4.0/AV:P/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-45617
CWE-ID:
CWE-908 - Use of Uninitialized Resource
Exploit availability: No
DescriptionThe vulnerability allows an attacker to bypass certain security restrictions.
The vulnerability exists due to usage of uninitialized resources in OpenSC, OpenSC tools, PKCS#11 module, minidriver, and CTK. An attacker with physical access to the system can use a crafted USB Device or Smart Card, which would present the system with a specially crafted response to APDUs. When buffers are partially filled with data, initialized parts of the buffer can be incorrectly accessed.
MitigationUpdate the affected package opensc to the latest version.
Vulnerable software versionsUbuntu: 16.04 - 20.04
opensc-pkcs11 (Ubuntu package): before Ubuntu Pro
opensc (Ubuntu package): before Ubuntu Pro
CPE2.3https://ubuntu.com/security/notices/USN-7346-2
Q & A
Can this vulnerability be exploited remotely?
No. The attacker should have physical access to the system in order to successfully exploit this vulnerability.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU98504
Risk: Low
CVSSv4.0: 0.1 [CVSS:4.0/AV:P/AC:L/AT:P/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-45618
CWE-ID:
CWE-908 - Use of Uninitialized Resource
Exploit availability: No
DescriptionThe vulnerability allows an attacker to bypass certain security restrictions.
The vulnerability exists due to usage of uninitialized resources in pkcs15-init in OpenSC. An attacker with physical access to the system can use a crafted USB Device or Smart Card, which would present the system with a specially crafted response to APDUs. When buffers are partially filled with data, initialized parts of the buffer can be incorrectly accessed.
MitigationUpdate the affected package opensc to the latest version.
Vulnerable software versionsUbuntu: 16.04 - 20.04
opensc-pkcs11 (Ubuntu package): before Ubuntu Pro
opensc (Ubuntu package): before Ubuntu Pro
CPE2.3https://ubuntu.com/security/notices/USN-7346-2
Q & A
Can this vulnerability be exploited remotely?
No. The attacker should have physical access to the system in order to successfully exploit this vulnerability.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU98506
Risk: Low
CVSSv4.0: 0.1 [CVSS:4.0/AV:P/AC:L/AT:P/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-45620
CWE-ID:
CWE-119 - Memory corruption
Exploit availability: No
DescriptionThe vulnerability allows an attacker to bypass implemented security restrictions.
The vulnerability exists due to a boundary error in the pkcs15-init tool in OpenSC. An attacker with physical access to the system can use a crafted USB Device or Smart Card, which would present the system with a specially crafted response to APDUs. When buffers are partially filled with data, initialized parts of the buffer can be incorrectly accessed.
MitigationUpdate the affected package opensc to the latest version.
Vulnerable software versionsUbuntu: 16.04 - 20.04
opensc-pkcs11 (Ubuntu package): before Ubuntu Pro
opensc (Ubuntu package): before Ubuntu Pro
CPE2.3https://ubuntu.com/security/notices/USN-7346-2
Q & A
Can this vulnerability be exploited remotely?
No. The attacker should have physical access to the system in order to successfully exploit this vulnerability.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU98505
Risk: Low
CVSSv4.0: 0.1 [CVSS:4.0/AV:P/AC:L/AT:P/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-45619
CWE-ID:
CWE-908 - Use of Uninitialized Resource
Exploit availability: No
DescriptionThe vulnerability allows an attacker to bypass certain security restrictions.
The vulnerability exists due to usage of uninitialized resources in OpenSC, OpenSC tools, PKCS#11 module, minidriver, and CTK. An attacker with physical access to the system can use a crafted USB Device or Smart Card, which would present the system with a specially crafted response to APDUs. When buffers are partially filled with data, initialized parts of the buffer can be incorrectly accessed.
MitigationUpdate the affected package opensc to the latest version.
Vulnerable software versionsUbuntu: 16.04 - 20.04
opensc-pkcs11 (Ubuntu package): before Ubuntu Pro
opensc (Ubuntu package): before Ubuntu Pro
CPE2.3https://ubuntu.com/security/notices/USN-7346-2
Q & A
Can this vulnerability be exploited remotely?
No. The attacker should have physical access to the system in order to successfully exploit this vulnerability.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU98507
Risk: Low
CVSSv4.0: 2 [CVSS:4.0/AV:P/AC:L/AT:P/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-8443
CWE-ID:
CWE-122 - Heap-based Buffer Overflow
Exploit availability: No
DescriptionThe vulnerability allows an attacker to bypass implemented security restrictions.
The vulnerability exists due to a boundary error in the libopensc OpenPGP driver. An attacker with physical access to the system can use a crafted USB device or smart card with malicious responses to the APDUs during the card enrollment process using the pkcs15-init
tool to trigger an out-of-bound rights, possibly resulting in arbitrary code execution.
Update the affected package opensc to the latest version.
Vulnerable software versionsUbuntu: 16.04 - 20.04
opensc-pkcs11 (Ubuntu package): before Ubuntu Pro
opensc (Ubuntu package): before Ubuntu Pro
CPE2.3https://ubuntu.com/security/notices/USN-7346-2
Q & A
Can this vulnerability be exploited remotely?
No. The attacker should have physical access to the system in order to successfully exploit this vulnerability.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.