CVE-2024-45619Classic Buffer Overflow in Project Opensc

Severity
4.3MEDIUMNVD
EPSS
0.1%
top 74.84%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedSep 3
Latest updateMar 12

Description

A vulnerability was found in OpenSC, OpenSC tools, PKCS#11 module, minidriver, and CTK. An attacker could use a crafted USB Device or Smart Card, which would present the system with a specially crafted response to APDUs. When buffers are partially filled with data, initialized parts of the buffer can be incorrectly accessed.

CVSS vector

CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:LExploitability: 0.9 | Impact: 3.4

Affected Packages2 packages

NVDopensc_project/opensc< 0.26.0
Debianopensc_project/opensc< 0.21.0-1+deb11u1+3

Also affects: Enterprise Linux 7.0, 8.0, 9.0

🔴Vulnerability Details

3
GHSA
GHSA-9vxw-3j77-cj78: A vulnerability was found in OpenSC, OpenSC tools, PKCS#11 module, minidriver, and CTK2024-09-04
CVEList
Libopensc: incorrect handling length of buffers or files in libopensc2024-09-03
OSV
CVE-2024-45619: A vulnerability was found in OpenSC, OpenSC tools, PKCS#11 module, minidriver, and CTK2024-09-03

📋Vendor Advisories

4
Ubuntu
OpenSC vulnerabilities2025-03-12
Microsoft
Libopensc: incorrect handling length of buffers or files in libopensc2024-09-10
Red Hat
libopensc: Incorrect handling length of buffers or files in libopensc2024-09-02
Debian
CVE-2024-45619: opensc - A vulnerability was found in OpenSC, OpenSC tools, PKCS#11 module, minidriver, a...2024
CVE-2024-45619 — Classic Buffer Overflow | cvebase