FKIE_CVE-2008-3972
Vulnerability from fkie_nvd - Published: 2008-09-11 01:13 - Updated: 2025-04-09 00:30
Severity ?
Summary
pkcs15-tool in OpenSC before 0.11.6 does not apply security updates to a smart card unless the card's label matches the "OpenSC" string, which might allow physically proximate attackers to exploit vulnerabilities that the card owner expected were patched, as demonstrated by exploitation of CVE-2008-2235.
References
Impacted products
| Vendor | Product | Version | |
|---|---|---|---|
| opensc-project | opensc | * | |
| opensc-project | opensc | 0.4.0 | |
| opensc-project | opensc | 0.5.0 | |
| opensc-project | opensc | 0.6.0 | |
| opensc-project | opensc | 0.6.1 | |
| opensc-project | opensc | 0.7.0 | |
| opensc-project | opensc | 0.8.0 | |
| opensc-project | opensc | 0.8.1 | |
| opensc-project | opensc | 0.9.2 | |
| opensc-project | opensc | 0.9.3 | |
| opensc-project | opensc | 0.9.4 | |
| opensc-project | opensc | 0.9.5 | |
| opensc-project | opensc | 0.9.6 | |
| opensc-project | opensc | 0.10.0 | |
| opensc-project | opensc | 0.10.1 | |
| opensc-project | opensc | 0.11.0 | |
| opensc-project | opensc | 0.11.1 | |
| opensc-project | opensc | 0.11.2 | |
| opensc-project | opensc | 0.11.3 | |
| opensc-project | opensc | 0.11.3 | |
| opensc-project | opensc | 0.11.4 | |
| siemens | cardos | m4 |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:opensc-project:opensc:*:*:*:*:*:*:*:*",
"matchCriteriaId": "5C5385FB-359D-4A1D-9CC7-803536F497CE",
"versionEndIncluding": "0.11.5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:opensc-project:opensc:0.4.0:*:*:*:*:*:*:*",
"matchCriteriaId": "471DBF4E-54B8-4776-A0BA-0F65FE02192E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:opensc-project:opensc:0.5.0:*:*:*:*:*:*:*",
"matchCriteriaId": "9BC7891E-1898-442A-96BB-5B8EE5A5B400",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:opensc-project:opensc:0.6.0:*:*:*:*:*:*:*",
"matchCriteriaId": "EA4321E6-1D08-489C-948F-2673C30D762C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:opensc-project:opensc:0.6.1:*:*:*:*:*:*:*",
"matchCriteriaId": "8498096A-19A9-4C09-99C3-CC1C45D6BA40",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:opensc-project:opensc:0.7.0:*:*:*:*:*:*:*",
"matchCriteriaId": "5028CF13-2807-4813-A542-A1CD6E735CC5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:opensc-project:opensc:0.8.0:*:*:*:*:*:*:*",
"matchCriteriaId": "CE75F1ED-E653-482C-B960-42DA2854E974",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:opensc-project:opensc:0.8.1:*:*:*:*:*:*:*",
"matchCriteriaId": "931CE287-97AF-4B73-BA57-FB9B9AAA7016",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:opensc-project:opensc:0.9.2:*:*:*:*:*:*:*",
"matchCriteriaId": "04701B8B-523A-4148-805C-419336D91CA2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:opensc-project:opensc:0.9.3:*:*:*:*:*:*:*",
"matchCriteriaId": "2194636B-7F74-4EC2-A02F-CE0F29914D76",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:opensc-project:opensc:0.9.4:*:*:*:*:*:*:*",
"matchCriteriaId": "E1D617E6-4EEC-4024-92D7-930F9A90F6DF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:opensc-project:opensc:0.9.5:*:*:*:*:*:*:*",
"matchCriteriaId": "428986EC-328E-49F8-AAE7-EECD97F6B6FC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:opensc-project:opensc:0.9.6:*:*:*:*:*:*:*",
"matchCriteriaId": "6A64E85D-B1A7-48FB-8438-8173249ED817",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:opensc-project:opensc:0.10.0:*:*:*:*:*:*:*",
"matchCriteriaId": "13234C4B-7598-46B1-A8F0-7C0C863DE4C5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:opensc-project:opensc:0.10.1:*:*:*:*:*:*:*",
"matchCriteriaId": "FFC7C1A0-83AA-4989-A023-0B22B95133B9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:opensc-project:opensc:0.11.0:*:*:*:*:*:*:*",
"matchCriteriaId": "B093D7C9-242E-4CC7-9971-71D9AE19A7F7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:opensc-project:opensc:0.11.1:*:*:*:*:*:*:*",
"matchCriteriaId": "353AFA23-88C0-45AA-B9EF-EF7A4DC6AFE3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:opensc-project:opensc:0.11.2:*:*:*:*:*:*:*",
"matchCriteriaId": "EA2024C5-238A-4734-B8C6-D4F99EEFBC07",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:opensc-project:opensc:0.11.3:*:*:*:*:*:*:*",
"matchCriteriaId": "DF611D89-FA24-4421-A8A8-5290629C81D1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:opensc-project:opensc:0.11.3:pre3:*:*:*:*:*:*",
"matchCriteriaId": "0ECCFF79-6515-42F8-B986-4C06BE1F79D6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:opensc-project:opensc:0.11.4:*:*:*:*:*:*:*",
"matchCriteriaId": "A74B19CB-8AFB-4A07-9A84-063BFF47E089",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:siemens:cardos:m4:*:*:*:*:*:*:*",
"matchCriteriaId": "FEF8B710-EAF0-4381-B1C5-B2EAA91737DE",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "pkcs15-tool in OpenSC before 0.11.6 does not apply security updates to a smart card unless the card\u0027s label matches the \"OpenSC\" string, which might allow physically proximate attackers to exploit vulnerabilities that the card owner expected were patched, as demonstrated by exploitation of CVE-2008-2235."
},
{
"lang": "es",
"value": "pkcs15-tool en OpenSC antes de 0.11.6 no aplica las actualizaciones de seguridad a una tarjeta inteligente a menos que la etiqueta de la tarjeta corresponda con la cadena \"OpenSC\", lo que podr\u00eda permitir a atacantes f\u00edsicamente pr\u00f3ximos explotar vulnerabilidades que el propietario de la tarjeta cre\u00eda que estaban parcheadas, como se demostr\u00f3 con la explotaci\u00f3n de CVE-2008-2235."
}
],
"evaluatorSolution": "Direct Patch Link - http://www.opensc-project.org/files/opensc/opensc-0.11.6.tar.gz",
"id": "CVE-2008-3972",
"lastModified": "2025-04-09T00:30:58.490",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": true,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "LOCAL",
"authentication": "NONE",
"availabilityImpact": "COMPLETE",
"baseScore": 6.6,
"confidentialityImpact": "NONE",
"integrityImpact": "COMPLETE",
"vectorString": "AV:L/AC:L/Au:N/C:N/I:C/A:C",
"version": "2.0"
},
"exploitabilityScore": 3.9,
"impactScore": 9.2,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
]
},
"published": "2008-09-11T01:13:47.807",
"references": [
{
"source": "cve@mitre.org",
"url": "http://lists.opensuse.org/opensuse-security-announce/2008-09/msg00005.html"
},
{
"source": "cve@mitre.org",
"url": "http://secunia.com/advisories/32099"
},
{
"source": "cve@mitre.org",
"url": "http://secunia.com/advisories/34362"
},
{
"source": "cve@mitre.org",
"url": "http://www.opensc-project.org/pipermail/opensc-announce/2008-August/000021.html"
},
{
"source": "cve@mitre.org",
"url": "http://www.openwall.com/lists/oss-security/2008/09/09/14"
},
{
"source": "cve@mitre.org",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/45045"
},
{
"source": "cve@mitre.org",
"url": "https://www.redhat.com/archives/fedora-package-announce/2009-March/msg00686.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://lists.opensuse.org/opensuse-security-announce/2008-09/msg00005.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://secunia.com/advisories/32099"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://secunia.com/advisories/34362"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.opensc-project.org/pipermail/opensc-announce/2008-August/000021.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.openwall.com/lists/oss-security/2008/09/09/14"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/45045"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://www.redhat.com/archives/fedora-package-announce/2009-March/msg00686.html"
}
],
"sourceIdentifier": "cve@mitre.org",
"vulnStatus": "Deferred",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-264"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…