CVE-2019-16058

An issue was discovered in the pam_p11 component 0.2.0 and 0.3.0 for OpenSC. If a smart card creates a signature with a length longer than 256 bytes, this triggers a buffer overflow. This may be the case for RSA keys with 4096 bits depending on the signature scheme.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:opensc_project:opensc:0.2.0:*:*:*:*:*:*:*
cpe:2.3:a:opensc_project:opensc:0.3.0:*:*:*:*:*:*:*

History

21 Nov 2024, 04:29

Type Values Removed Values Added
References () http://www.openwall.com/lists/oss-security/2019/09/12/1 - () http://www.openwall.com/lists/oss-security/2019/09/12/1 -
References () https://github.com/OpenSC/pam_p11/commit/d150b60e1e14c261b113f55681419ad1dfa8a76c - Patch, Third Party Advisory () https://github.com/OpenSC/pam_p11/commit/d150b60e1e14c261b113f55681419ad1dfa8a76c - Patch, Third Party Advisory

Information

Published : 2019-09-06 18:15

Updated : 2024-11-21 04:29


NVD link : CVE-2019-16058

Mitre link : CVE-2019-16058

CVE.ORG link : CVE-2019-16058


JSON object : View

Products Affected

opensc_project

  • opensc
CWE
CWE-119

Improper Restriction of Operations within the Bounds of a Memory Buffer