An issue was discovered in the pam_p11 component 0.2.0 and 0.3.0 for OpenSC. If a smart card creates a signature with a length longer than 256 bytes, this triggers a buffer overflow. This may be the case for RSA keys with 4096 bits depending on the signature scheme.
References
Link | Resource |
---|---|
http://www.openwall.com/lists/oss-security/2019/09/12/1 | |
https://github.com/OpenSC/pam_p11/commit/d150b60e1e14c261b113f55681419ad1dfa8a76c | Patch Third Party Advisory |
Configurations
Configuration 1 (hide)
|
History
No history.
Information
Published : 2019-09-06 18:15
Updated : 2024-02-04 20:20
NVD link : CVE-2019-16058
Mitre link : CVE-2019-16058
CVE.ORG link : CVE-2019-16058
JSON object : View
Products Affected
opensc_project
- opensc
CWE
CWE-119
Improper Restriction of Operations within the Bounds of a Memory Buffer