CVE-2008-3972 (GCVE-0-2008-3972)

Vulnerability from cvelistv5 – Published: 2008-09-10 15:00 – Updated: 2024-08-07 10:00
VLAI?
Summary
pkcs15-tool in OpenSC before 0.11.6 does not apply security updates to a smart card unless the card's label matches the "OpenSC" string, which might allow physically proximate attackers to exploit vulnerabilities that the card owner expected were patched, as demonstrated by exploitation of CVE-2008-2235.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
References
https://exchange.xforce.ibmcloud.com/vulnerabilit… vdb-entryx_refsource_XF
http://secunia.com/advisories/34362 third-party-advisoryx_refsource_SECUNIA
https://www.redhat.com/archives/fedora-package-an… vendor-advisoryx_refsource_FEDORA
http://www.openwall.com/lists/oss-security/2008/0… mailing-listx_refsource_MLIST
http://www.opensc-project.org/pipermail/opensc-an… mailing-listx_refsource_MLIST
http://secunia.com/advisories/32099 third-party-advisoryx_refsource_SECUNIA
http://lists.opensuse.org/opensuse-security-annou… vendor-advisoryx_refsource_SUSE
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T10:00:42.172Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "opensc-pkcs15tool-weak-security(45045)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/45045"
          },
          {
            "name": "34362",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/34362"
          },
          {
            "name": "FEDORA-2009-2267",
            "tags": [
              "vendor-advisory",
              "x_refsource_FEDORA",
              "x_transferred"
            ],
            "url": "https://www.redhat.com/archives/fedora-package-announce/2009-March/msg00686.html"
          },
          {
            "name": "[oss-security] 20080909 Re: opensc 0.11.6 with fixed security update",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "http://www.openwall.com/lists/oss-security/2008/09/09/14"
          },
          {
            "name": "[opensc-announce] 20080827 opensc 0.11.6 with fixed security update",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "http://www.opensc-project.org/pipermail/opensc-announce/2008-August/000021.html"
          },
          {
            "name": "32099",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/32099"
          },
          {
            "name": "SUSE-SR:2008:019",
            "tags": [
              "vendor-advisory",
              "x_refsource_SUSE",
              "x_transferred"
            ],
            "url": "http://lists.opensuse.org/opensuse-security-announce/2008-09/msg00005.html"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2008-08-27T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "pkcs15-tool in OpenSC before 0.11.6 does not apply security updates to a smart card unless the card\u0027s label matches the \"OpenSC\" string, which might allow physically proximate attackers to exploit vulnerabilities that the card owner expected were patched, as demonstrated by exploitation of CVE-2008-2235."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2017-08-07T12:57:01",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "opensc-pkcs15tool-weak-security(45045)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/45045"
        },
        {
          "name": "34362",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/34362"
        },
        {
          "name": "FEDORA-2009-2267",
          "tags": [
            "vendor-advisory",
            "x_refsource_FEDORA"
          ],
          "url": "https://www.redhat.com/archives/fedora-package-announce/2009-March/msg00686.html"
        },
        {
          "name": "[oss-security] 20080909 Re: opensc 0.11.6 with fixed security update",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "http://www.openwall.com/lists/oss-security/2008/09/09/14"
        },
        {
          "name": "[opensc-announce] 20080827 opensc 0.11.6 with fixed security update",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "http://www.opensc-project.org/pipermail/opensc-announce/2008-August/000021.html"
        },
        {
          "name": "32099",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/32099"
        },
        {
          "name": "SUSE-SR:2008:019",
          "tags": [
            "vendor-advisory",
            "x_refsource_SUSE"
          ],
          "url": "http://lists.opensuse.org/opensuse-security-announce/2008-09/msg00005.html"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2008-3972",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "pkcs15-tool in OpenSC before 0.11.6 does not apply security updates to a smart card unless the card\u0027s label matches the \"OpenSC\" string, which might allow physically proximate attackers to exploit vulnerabilities that the card owner expected were patched, as demonstrated by exploitation of CVE-2008-2235."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "opensc-pkcs15tool-weak-security(45045)",
              "refsource": "XF",
              "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/45045"
            },
            {
              "name": "34362",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/34362"
            },
            {
              "name": "FEDORA-2009-2267",
              "refsource": "FEDORA",
              "url": "https://www.redhat.com/archives/fedora-package-announce/2009-March/msg00686.html"
            },
            {
              "name": "[oss-security] 20080909 Re: opensc 0.11.6 with fixed security update",
              "refsource": "MLIST",
              "url": "http://www.openwall.com/lists/oss-security/2008/09/09/14"
            },
            {
              "name": "[opensc-announce] 20080827 opensc 0.11.6 with fixed security update",
              "refsource": "MLIST",
              "url": "http://www.opensc-project.org/pipermail/opensc-announce/2008-August/000021.html"
            },
            {
              "name": "32099",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/32099"
            },
            {
              "name": "SUSE-SR:2008:019",
              "refsource": "SUSE",
              "url": "http://lists.opensuse.org/opensuse-security-announce/2008-09/msg00005.html"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2008-3972",
    "datePublished": "2008-09-10T15:00:00",
    "dateReserved": "2008-09-09T00:00:00",
    "dateUpdated": "2024-08-07T10:00:42.172Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1",
  "vulnerability-lookup:meta": {
    "fkie_nvd": {
      "configurations": "[{\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:opensc-project:opensc:*:*:*:*:*:*:*:*\", \"versionEndIncluding\": \"0.11.5\", \"matchCriteriaId\": \"5C5385FB-359D-4A1D-9CC7-803536F497CE\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:opensc-project:opensc:0.4.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"471DBF4E-54B8-4776-A0BA-0F65FE02192E\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:opensc-project:opensc:0.5.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"9BC7891E-1898-442A-96BB-5B8EE5A5B400\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:opensc-project:opensc:0.6.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"EA4321E6-1D08-489C-948F-2673C30D762C\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:opensc-project:opensc:0.6.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"8498096A-19A9-4C09-99C3-CC1C45D6BA40\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:opensc-project:opensc:0.7.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"5028CF13-2807-4813-A542-A1CD6E735CC5\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:opensc-project:opensc:0.8.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"CE75F1ED-E653-482C-B960-42DA2854E974\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:opensc-project:opensc:0.8.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"931CE287-97AF-4B73-BA57-FB9B9AAA7016\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:opensc-project:opensc:0.9.2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"04701B8B-523A-4148-805C-419336D91CA2\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:opensc-project:opensc:0.9.3:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"2194636B-7F74-4EC2-A02F-CE0F29914D76\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:opensc-project:opensc:0.9.4:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"E1D617E6-4EEC-4024-92D7-930F9A90F6DF\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:opensc-project:opensc:0.9.5:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"428986EC-328E-49F8-AAE7-EECD97F6B6FC\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:opensc-project:opensc:0.9.6:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"6A64E85D-B1A7-48FB-8438-8173249ED817\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:opensc-project:opensc:0.10.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"13234C4B-7598-46B1-A8F0-7C0C863DE4C5\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:opensc-project:opensc:0.10.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"FFC7C1A0-83AA-4989-A023-0B22B95133B9\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:opensc-project:opensc:0.11.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"B093D7C9-242E-4CC7-9971-71D9AE19A7F7\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:opensc-project:opensc:0.11.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"353AFA23-88C0-45AA-B9EF-EF7A4DC6AFE3\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:opensc-project:opensc:0.11.2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"EA2024C5-238A-4734-B8C6-D4F99EEFBC07\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:opensc-project:opensc:0.11.3:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"DF611D89-FA24-4421-A8A8-5290629C81D1\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:opensc-project:opensc:0.11.3:pre3:*:*:*:*:*:*\", \"matchCriteriaId\": \"0ECCFF79-6515-42F8-B986-4C06BE1F79D6\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:opensc-project:opensc:0.11.4:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"A74B19CB-8AFB-4A07-9A84-063BFF47E089\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:o:siemens:cardos:m4:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"FEF8B710-EAF0-4381-B1C5-B2EAA91737DE\"}]}]}]",
      "descriptions": "[{\"lang\": \"en\", \"value\": \"pkcs15-tool in OpenSC before 0.11.6 does not apply security updates to a smart card unless the card\u0027s label matches the \\\"OpenSC\\\" string, which might allow physically proximate attackers to exploit vulnerabilities that the card owner expected were patched, as demonstrated by exploitation of CVE-2008-2235.\"}, {\"lang\": \"es\", \"value\": \"pkcs15-tool en OpenSC antes de 0.11.6 no aplica las actualizaciones de seguridad a una tarjeta inteligente a menos que la etiqueta de la tarjeta corresponda con la cadena \\\"OpenSC\\\", lo que podr\\u00eda permitir a atacantes f\\u00edsicamente pr\\u00f3ximos explotar vulnerabilidades que el propietario de la tarjeta cre\\u00eda que estaban parcheadas, como se demostr\\u00f3 con la explotaci\\u00f3n de CVE-2008-2235.\"}]",
      "evaluatorSolution": "Direct Patch Link - http://www.opensc-project.org/files/opensc/opensc-0.11.6.tar.gz",
      "id": "CVE-2008-3972",
      "lastModified": "2024-11-21T00:50:36.663",
      "metrics": "{\"cvssMetricV2\": [{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"2.0\", \"vectorString\": \"AV:L/AC:L/Au:N/C:N/I:C/A:C\", \"baseScore\": 6.6, \"accessVector\": \"LOCAL\", \"accessComplexity\": \"LOW\", \"authentication\": \"NONE\", \"confidentialityImpact\": \"NONE\", \"integrityImpact\": \"COMPLETE\", \"availabilityImpact\": \"COMPLETE\"}, \"baseSeverity\": \"MEDIUM\", \"exploitabilityScore\": 3.9, \"impactScore\": 9.2, \"acInsufInfo\": true, \"obtainAllPrivilege\": false, \"obtainUserPrivilege\": false, \"obtainOtherPrivilege\": false, \"userInteractionRequired\": false}]}",
      "published": "2008-09-11T01:13:47.807",
      "references": "[{\"url\": \"http://lists.opensuse.org/opensuse-security-announce/2008-09/msg00005.html\", \"source\": \"cve@mitre.org\"}, {\"url\": \"http://secunia.com/advisories/32099\", \"source\": \"cve@mitre.org\"}, {\"url\": \"http://secunia.com/advisories/34362\", \"source\": \"cve@mitre.org\"}, {\"url\": \"http://www.opensc-project.org/pipermail/opensc-announce/2008-August/000021.html\", \"source\": \"cve@mitre.org\"}, {\"url\": \"http://www.openwall.com/lists/oss-security/2008/09/09/14\", \"source\": \"cve@mitre.org\"}, {\"url\": \"https://exchange.xforce.ibmcloud.com/vulnerabilities/45045\", \"source\": \"cve@mitre.org\"}, {\"url\": \"https://www.redhat.com/archives/fedora-package-announce/2009-March/msg00686.html\", \"source\": \"cve@mitre.org\"}, {\"url\": \"http://lists.opensuse.org/opensuse-security-announce/2008-09/msg00005.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://secunia.com/advisories/32099\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://secunia.com/advisories/34362\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://www.opensc-project.org/pipermail/opensc-announce/2008-August/000021.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://www.openwall.com/lists/oss-security/2008/09/09/14\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"https://exchange.xforce.ibmcloud.com/vulnerabilities/45045\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"https://www.redhat.com/archives/fedora-package-announce/2009-March/msg00686.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}]",
      "sourceIdentifier": "cve@mitre.org",
      "vulnStatus": "Modified",
      "weaknesses": "[{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"description\": [{\"lang\": \"en\", \"value\": \"CWE-264\"}]}]"
    },
    "nvd": "{\"cve\":{\"id\":\"CVE-2008-3972\",\"sourceIdentifier\":\"cve@mitre.org\",\"published\":\"2008-09-11T01:13:47.807\",\"lastModified\":\"2025-04-09T00:30:58.490\",\"vulnStatus\":\"Deferred\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"pkcs15-tool in OpenSC before 0.11.6 does not apply security updates to a smart card unless the card\u0027s label matches the \\\"OpenSC\\\" string, which might allow physically proximate attackers to exploit vulnerabilities that the card owner expected were patched, as demonstrated by exploitation of CVE-2008-2235.\"},{\"lang\":\"es\",\"value\":\"pkcs15-tool en OpenSC antes de 0.11.6 no aplica las actualizaciones de seguridad a una tarjeta inteligente a menos que la etiqueta de la tarjeta corresponda con la cadena \\\"OpenSC\\\", lo que podr\u00eda permitir a atacantes f\u00edsicamente pr\u00f3ximos explotar vulnerabilidades que el propietario de la tarjeta cre\u00eda que estaban parcheadas, como se demostr\u00f3 con la explotaci\u00f3n de CVE-2008-2235.\"}],\"metrics\":{\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:L/AC:L/Au:N/C:N/I:C/A:C\",\"baseScore\":6.6,\"accessVector\":\"LOCAL\",\"accessComplexity\":\"LOW\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"COMPLETE\",\"availabilityImpact\":\"COMPLETE\"},\"baseSeverity\":\"MEDIUM\",\"exploitabilityScore\":3.9,\"impactScore\":9.2,\"acInsufInfo\":true,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-264\"}]}],\"configurations\":[{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:opensc-project:opensc:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"0.11.5\",\"matchCriteriaId\":\"5C5385FB-359D-4A1D-9CC7-803536F497CE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:opensc-project:opensc:0.4.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"471DBF4E-54B8-4776-A0BA-0F65FE02192E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:opensc-project:opensc:0.5.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9BC7891E-1898-442A-96BB-5B8EE5A5B400\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:opensc-project:opensc:0.6.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EA4321E6-1D08-489C-948F-2673C30D762C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:opensc-project:opensc:0.6.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8498096A-19A9-4C09-99C3-CC1C45D6BA40\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:opensc-project:opensc:0.7.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5028CF13-2807-4813-A542-A1CD6E735CC5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:opensc-project:opensc:0.8.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CE75F1ED-E653-482C-B960-42DA2854E974\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:opensc-project:opensc:0.8.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"931CE287-97AF-4B73-BA57-FB9B9AAA7016\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:opensc-project:opensc:0.9.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"04701B8B-523A-4148-805C-419336D91CA2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:opensc-project:opensc:0.9.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2194636B-7F74-4EC2-A02F-CE0F29914D76\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:opensc-project:opensc:0.9.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E1D617E6-4EEC-4024-92D7-930F9A90F6DF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:opensc-project:opensc:0.9.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"428986EC-328E-49F8-AAE7-EECD97F6B6FC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:opensc-project:opensc:0.9.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6A64E85D-B1A7-48FB-8438-8173249ED817\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:opensc-project:opensc:0.10.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"13234C4B-7598-46B1-A8F0-7C0C863DE4C5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:opensc-project:opensc:0.10.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FFC7C1A0-83AA-4989-A023-0B22B95133B9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:opensc-project:opensc:0.11.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B093D7C9-242E-4CC7-9971-71D9AE19A7F7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:opensc-project:opensc:0.11.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"353AFA23-88C0-45AA-B9EF-EF7A4DC6AFE3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:opensc-project:opensc:0.11.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EA2024C5-238A-4734-B8C6-D4F99EEFBC07\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:opensc-project:opensc:0.11.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DF611D89-FA24-4421-A8A8-5290629C81D1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:opensc-project:opensc:0.11.3:pre3:*:*:*:*:*:*\",\"matchCriteriaId\":\"0ECCFF79-6515-42F8-B986-4C06BE1F79D6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:opensc-project:opensc:0.11.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A74B19CB-8AFB-4A07-9A84-063BFF47E089\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:o:siemens:cardos:m4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FEF8B710-EAF0-4381-B1C5-B2EAA91737DE\"}]}]}],\"references\":[{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2008-09/msg00005.html\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://secunia.com/advisories/32099\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://secunia.com/advisories/34362\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.opensc-project.org/pipermail/opensc-announce/2008-August/000021.html\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.openwall.com/lists/oss-security/2008/09/09/14\",\"source\":\"cve@mitre.org\"},{\"url\":\"https://exchange.xforce.ibmcloud.com/vulnerabilities/45045\",\"source\":\"cve@mitre.org\"},{\"url\":\"https://www.redhat.com/archives/fedora-package-announce/2009-March/msg00686.html\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2008-09/msg00005.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/32099\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/34362\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.opensc-project.org/pipermail/opensc-announce/2008-August/000021.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.openwall.com/lists/oss-security/2008/09/09/14\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://exchange.xforce.ibmcloud.com/vulnerabilities/45045\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://www.redhat.com/archives/fedora-package-announce/2009-March/msg00686.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"}],\"evaluatorSolution\":\"Direct Patch Link - http://www.opensc-project.org/files/opensc/opensc-0.11.6.tar.gz\"}}"
  }
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or observed by the user.
  • Confirmed: The vulnerability has been validated from an analyst's perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
  • Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
  • Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
  • Not confirmed: The user expressed doubt about the validity of the vulnerability.
  • Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.


Loading…

Detection rules are retrieved from Rulezet.

Loading…

Loading…