An issue was discovered in the pam_p11 component 0.2.0 and 0.3.0 for OpenSC. If a smart card creates a signature with a length longer than 256 bytes, this triggers a buffer overflow. This may be the case for RSA keys with 4096 bits depending on the signature scheme.
References
Link | Resource |
---|---|
https://github.com/OpenSC/pam_p11/commit/d150b60e1e14c261b113f55681419ad1dfa8a76c | Patch Third Party Advisory |
http://www.openwall.com/lists/oss-security/2019/09/12/1 |
Configurations
Configuration 1 (hide)
|
Information
Published : 2019-09-06 11:15
Updated : 2019-09-12 08:15
NVD link : CVE-2019-16058
Mitre link : CVE-2019-16058
JSON object : View
CWE
CWE-119
Improper Restriction of Operations within the Bounds of a Memory Buffer
Products Affected
opensc_project
- opensc