CVE-2009-0368

OpenSC before 0.11.7 allows physically proximate attackers to bypass intended PIN requirements and read private data objects via a (1) low level APDU command or (2) debugging tool, as demonstrated by reading the 4601 or 4701 file with the opensc-explorer or opensc-tool program.
References
Link Resource
http://lists.opensuse.org/opensuse-security-announce/2009-05/msg00000.html
http://openwall.com/lists/oss-security/2009/02/26/1 Patch
http://secunia.com/advisories/34052 Vendor Advisory
http://secunia.com/advisories/34120
http://secunia.com/advisories/34362
http://secunia.com/advisories/34377
http://secunia.com/advisories/35065
http://secunia.com/advisories/36074
http://security.gentoo.org/glsa/glsa-200908-01.xml
http://www.debian.org/security/2009/dsa-1734
http://www.opensc-project.org/pipermail/opensc-announce/2009-February/000023.html Vendor Advisory
http://www.securityfocus.com/bid/33922 Exploit Patch
https://exchange.xforce.ibmcloud.com/vulnerabilities/48958
https://www.redhat.com/archives/fedora-package-announce/2009-March/msg00673.html
https://www.redhat.com/archives/fedora-package-announce/2009-March/msg00686.html
http://lists.opensuse.org/opensuse-security-announce/2009-05/msg00000.html
http://openwall.com/lists/oss-security/2009/02/26/1 Patch
http://secunia.com/advisories/34052 Vendor Advisory
http://secunia.com/advisories/34120
http://secunia.com/advisories/34362
http://secunia.com/advisories/34377
http://secunia.com/advisories/35065
http://secunia.com/advisories/36074
http://security.gentoo.org/glsa/glsa-200908-01.xml
http://www.debian.org/security/2009/dsa-1734
http://www.opensc-project.org/pipermail/opensc-announce/2009-February/000023.html Vendor Advisory
http://www.securityfocus.com/bid/33922 Exploit Patch
https://exchange.xforce.ibmcloud.com/vulnerabilities/48958
https://www.redhat.com/archives/fedora-package-announce/2009-March/msg00673.html
https://www.redhat.com/archives/fedora-package-announce/2009-March/msg00686.html
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:opensc-project:opensc:*:*:*:*:*:*:*:*
cpe:2.3:a:opensc-project:opensc:0.3.2:*:*:*:*:*:*:*
cpe:2.3:a:opensc-project:opensc:0.3.5:*:*:*:*:*:*:*
cpe:2.3:a:opensc-project:opensc:0.4.0:*:*:*:*:*:*:*
cpe:2.3:a:opensc-project:opensc:0.5.0:*:*:*:*:*:*:*
cpe:2.3:a:opensc-project:opensc:0.6.0:*:*:*:*:*:*:*
cpe:2.3:a:opensc-project:opensc:0.6.1:*:*:*:*:*:*:*
cpe:2.3:a:opensc-project:opensc:0.7.0:*:*:*:*:*:*:*
cpe:2.3:a:opensc-project:opensc:0.8:*:*:*:*:*:*:*
cpe:2.3:a:opensc-project:opensc:0.8.0:*:*:*:*:*:*:*
cpe:2.3:a:opensc-project:opensc:0.8.0.0:*:*:*:*:*:*:*
cpe:2.3:a:opensc-project:opensc:0.8.1:*:*:*:*:*:*:*
cpe:2.3:a:opensc-project:opensc:0.9:*:*:*:*:*:*:*
cpe:2.3:a:opensc-project:opensc:0.9.2:*:*:*:*:*:*:*
cpe:2.3:a:opensc-project:opensc:0.9.3:*:*:*:*:*:*:*
cpe:2.3:a:opensc-project:opensc:0.9.4:*:*:*:*:*:*:*
cpe:2.3:a:opensc-project:opensc:0.9.5:*:*:*:*:*:*:*
cpe:2.3:a:opensc-project:opensc:0.9.6:*:*:*:*:*:*:*
cpe:2.3:a:opensc-project:opensc:0.9.7:*:*:*:*:*:*:*
cpe:2.3:a:opensc-project:opensc:0.9.7:b:*:*:*:*:*:*
cpe:2.3:a:opensc-project:opensc:0.9.7:d:*:*:*:*:*:*
cpe:2.3:a:opensc-project:opensc:0.9.8:*:*:*:*:*:*:*
cpe:2.3:a:opensc-project:opensc:0.10.0:*:*:*:*:*:*:*
cpe:2.3:a:opensc-project:opensc:0.10.1:*:*:*:*:*:*:*
cpe:2.3:a:opensc-project:opensc:0.11.0:*:*:*:*:*:*:*
cpe:2.3:a:opensc-project:opensc:0.11.1:*:*:*:*:*:*:*
cpe:2.3:a:opensc-project:opensc:0.11.2:*:*:*:*:*:*:*
cpe:2.3:a:opensc-project:opensc:0.11.3:*:*:*:*:*:*:*
cpe:2.3:a:opensc-project:opensc:0.11.3:pre3:*:*:*:*:*:*
cpe:2.3:a:opensc-project:opensc:0.11.4:*:*:*:*:*:*:*
cpe:2.3:a:opensc-project:opensc:0.11.5:*:*:*:*:*:*:*

History

No history.

Information

Published : 2009-03-02 22:30

Updated : 2025-04-09 00:30


NVD link : CVE-2009-0368

Mitre link : CVE-2009-0368

CVE.ORG link : CVE-2009-0368


JSON object : View

Products Affected

opensc-project

  • opensc
CWE
CWE-310

Cryptographic Issues