CVE-2018-16419Improper Restriction of Operations within the Bounds of a Memory Buffer in Project Opensc

Severity
6.6MEDIUMNVD
EPSS
0.2%
top 60.65%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedSep 4
Latest updateMay 14

Description

Several buffer overflows when handling responses from a Cryptoflex card in read_public_key in tools/cryptoflex-tool.c in OpenSC before 0.19.0-rc1 could be used by attackers able to supply crafted smartcards to cause a denial of service (application crash) or possibly have unspecified other impact.

CVSS vector

CVSS:3.0/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:HExploitability: 0.7 | Impact: 5.9

Affected Packages2 packages

Debianopensc_project/opensc< 0.19.0~rc1-1+3

Patches

🔴Vulnerability Details

3
GHSA
GHSA-955c-643p-2354: Several buffer overflows when handling responses from a Cryptoflex card in read_public_key in tools/cryptoflex-tool2022-05-14
OSV
CVE-2018-16419: Several buffer overflows when handling responses from a Cryptoflex card in read_public_key in tools/cryptoflex-tool2018-09-04
CVEList
CVE-2018-16419: Several buffer overflows when handling responses from a Cryptoflex card in read_public_key in tools/cryptoflex-tool2018-09-04

📋Vendor Advisories

2
Red Hat
opensc: Buffer overflow handling responses from Cryptoflex cards in cryptoflex-tool.c:read_public_key()2018-09-12
Debian
CVE-2018-16419: opensc - Several buffer overflows when handling responses from a Cryptoflex card in read_...2018

💬Community

2
Bugzilla
CVE-2018-16419 opensc: Buffer overflow handling responses from Cryptoflex cards in in cryptoflex-tool.c:read_public_key() [fedora-all]2018-09-12
Bugzilla
CVE-2018-16419 opensc: Buffer overflow handling responses from Cryptoflex cards in cryptoflex-tool.c:read_public_key()2018-09-12
CVE-2018-16419 — Opensc Project Opensc vulnerability | cvebase