• 公告ID (KylinSec-SA-2024-2227)

摘要:

The use-after-free vulnerability was found in the AuthentIC driver in OpenSC packages, occuring in the card enrolment process using pkcs15-init when a user or administrator enrols or modifies cards. An attacker must have physical access to the computer system and requires a crafted USB device or smart card to present the system with specially crafted responses to the APDUs, which are considered high complexity and low severity. This manipulation can allow for compromised card management operations during enrolment.

安全等级: Low

公告ID: KylinSec-SA-2024-2227

发布日期: 2024年5月27日

关联CVE: CVE-2024-1454  

  • 详细介绍

1. 漏洞描述

   

The use-after-free vulnerability was found in the AuthentIC driver in OpenSC packages, occuring in the card enrolment process using pkcs15-init when a user or administrator enrols or modifies cards. An attacker must have physical access to the computer system and requires a crafted USB device or smart card to present the system with specially crafted responses to the APDUs, which are considered high complexity and low severity. This manipulation can allow for compromised card management operations during enrolment.

2. 影响范围

cve名称 产品 组件 是否受影响
CVE-2024-1454 KY3.4-4A opensc Unaffected
CVE-2024-1454 KY3.4-5A opensc Unaffected
CVE-2024-1454 KY3.5.1 opensc Unaffected
CVE-2024-1454 KY3.5.2 opensc Unaffected

3. 影响组件

    无

4. 修复版本

    无

5. 修复方法

   无

6. 下载链接

    无
上一篇:KylinSec-SA-2024-2226 下一篇:KylinSec-SA-2024-2228