Vulnerability identifier: #VU45440
Vulnerability risk: Medium
CVSSv4.0: 1.2 [CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:U/U:Green]
CVE-ID:
CWE-ID:
CWE-121
Exploitation vector: Local
Exploit availability: No
Vulnerable software:
pcsc-lite
Other software /
Other software solutions
Vendor: pcsclite.apdu.fr
Description
The vulnerability allows a remote attacker to execute arbitrary code on the target system.
The vulnerability exists due to a boundary error within the ATRDecodeAtr function in the Answer-to-Reset (ATR) Handler (atrhandler.c) for pcscd when processing a smart card with an ATR message containing a long attribute value. A remote unauthenticated attacker can trigger stack-based buffer overflow and execute arbitrary code on the target system.
Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.
Mitigation
Cybersecurity Help is currently unaware of any official solution to address this vulnerability.
Vulnerable software versions
pcsc-lite: 1.5.3
External links
https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=607781
https://labs.mwrinfosecurity.com/files/Advisories/mwri_pcsc-atr-handler-buffer-overflow_2010-12-13.pdf
https://lists.alioth.debian.org/pipermail/pcsclite-cvs-commit/2010-November/004923.html
https://lists.fedoraproject.org/pipermail/package-announce/2011-January/053079.html
https://lists.fedoraproject.org/pipermail/package-announce/2011-January/053095.html
https://secunia.com/advisories/42912
https://secunia.com/advisories/43112
https://www.debian.org/security/2011/dsa-2156
https://www.mandriva.com/security/advisories?name=MDVSA-2011:015
https://www.openwall.com/lists/oss-security/2010/12/22/7
https://www.openwall.com/lists/oss-security/2011/01/03/3
https://www.securityfocus.com/bid/45450
https://www.vupen.com/english/advisories/2010/3264
https://www.vupen.com/english/advisories/2011/0101
https://www.vupen.com/english/advisories/2011/0180
https://www.vupen.com/english/advisories/2011/0256
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2010-4531
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.