Openwall GNU/*/Linux - a small security-enhanced Linux distro for servers
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Date: Tue, 21 Dec 2010 19:47:56 -0500 (EST)
From: Josh Bressers <bressers@...hat.com>
To: oss-security@...ts.openwall.com
Cc: "Steven M. Christey" <coley@...us.mitre.org>
Subject: Re: CVE request: opensc buffer overflow

Please use CVE-2010-4523 for this.

Thanks.

-- 
    JB


----- Original Message -----
> Hi,
> 
> Specially crafted smart cards could cause a buffer overflow in opensc:
> 
> http://labs.mwrinfosecurity.com/files/Advisories/mwri_opensc-get-serial-buffer-overflow_2010-12-13.pdf
> http://www.h-online.com/open/news/item/When-a-smart-card-can-root-your-computer-1154829.html
> https://www.opensc-project.org/opensc/changeset/4913
> 
> cu
> Ludwig
> 
> --
> (o_ Ludwig Nussel
> //\
> V_/_ http://www.suse.de/
> SUSE LINUX Products GmbH, GF: Markus Rex, HRB 16746 (AG Nuernberg)

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Powered by Openwall GNU/*/Linux - Powered by OpenVZ