OpenSC security advisories
Veronika Hanulíková edited this page Feb 13, 2024
·
13 revisions
Software often contains bugs, so does OpenSC. Be aware of the following security issues (in addition to overall security considerations) and upgrade to latest released version if needed.
- 13.02.2024 Heap use after free issue and vulnerability to Marvin attack have been identified in OpenSC
- Side-channel leaks while stripping encryption PKCS#1.5 padding CVE-2023-5992
- Memory use after free in AuthentIC driver when updating token info CVE-2024-1454
- 25.09.2023 Multiple issues have been identified in OpenSC, mostly buffer overflows, but also potential PIN bypass.
- The memory issues can be triggered by malicious smartcards sending malformed responses to APDU commands. Coded as (CVE-2023-40661 and CVE-2023-4535).
- The potential PIN bypass can happen when card tracks its own login state, demonstrated with Yubikey’s PIV applet CVE-2023-40660
- 20.10.2021 Multiple issues have been identified in OpenSC, including heap double free, use after free/return, and buffer overflows. They can be triggered by malicious smartcards sending malformed responses to APDU commands. Coded as (CVE-2021-42778, CVE-2021-42779, CVE-2021-42780 and CVE-2021-42781)
- 24.11.2020 Heap buffer overflows have been detected in the smart card drivers for oberthur, TCOS and Gemsafe GPK, which can be triggered by a specially crafted smart card during the initialization of OpenSC (CVE-2020-26570, CVE-2020-26571 and CVE-2020-26572)
- 13.09.2018 Multiple issues have been identified in OpenSC, ranging from stack based buffer overflows to out of bounds reads and writes on the heap. They can be triggered by malicious smartcards sending malformed responses to APDU commands. Source: X41-2018-002. Coded as CVE-2018-16391 CVE-2018-16392 CVE-2018-16393 CVE-2018-16418 CVE-2018-16419 CVE-2018-16420 CVE-2018-16421 CVE-2018-16422 CVE-2018-16423 CVE-2018-16424 CVE-2018-16425 CVE-2018-16426 CVE-2018-16427
- 17.12.2010 A rogue smart card, specially crafted for this purpose, can be used to potentially execute arbitrary code if inserted to a local machine. Source: MWR InfoSecurity Advisory, fix: 4913. Coded as CVE-2010-4523
- 07.05.2009 security advisory coded as CVE-2009-1603
- 26.02.2009 security advisory coded as CVE-2009-0368
- 27.08.2008 security advisory coded as CVE-2008-3972
- 31.07.2008 security advisory coded as CVE-2008-2235
Warning: Due to attempts to plant malicious links to our wiki, it is no longer open to anyone to edit. If you want to contribute to this, wiki, please open a pull request here: https://github.com/OpenSC/Wiki