fkie_cve-2009-0368
Vulnerability from fkie_nvd
Published
2009-03-02 22:30
Modified
2025-04-09 00:30
Severity ?
Summary
OpenSC before 0.11.7 allows physically proximate attackers to bypass intended PIN requirements and read private data objects via a (1) low level APDU command or (2) debugging tool, as demonstrated by reading the 4601 or 4701 file with the opensc-explorer or opensc-tool program.
References
cve@mitre.orghttp://lists.opensuse.org/opensuse-security-announce/2009-05/msg00000.html
cve@mitre.orghttp://openwall.com/lists/oss-security/2009/02/26/1Patch
cve@mitre.orghttp://secunia.com/advisories/34052Vendor Advisory
cve@mitre.orghttp://secunia.com/advisories/34120
cve@mitre.orghttp://secunia.com/advisories/34362
cve@mitre.orghttp://secunia.com/advisories/34377
cve@mitre.orghttp://secunia.com/advisories/35065
cve@mitre.orghttp://secunia.com/advisories/36074
cve@mitre.orghttp://security.gentoo.org/glsa/glsa-200908-01.xml
cve@mitre.orghttp://www.debian.org/security/2009/dsa-1734
cve@mitre.orghttp://www.opensc-project.org/pipermail/opensc-announce/2009-February/000023.htmlVendor Advisory
cve@mitre.orghttp://www.securityfocus.com/bid/33922Exploit, Patch
cve@mitre.orghttps://exchange.xforce.ibmcloud.com/vulnerabilities/48958
cve@mitre.orghttps://www.redhat.com/archives/fedora-package-announce/2009-March/msg00673.html
cve@mitre.orghttps://www.redhat.com/archives/fedora-package-announce/2009-March/msg00686.html
af854a3a-2127-422b-91ae-364da2661108http://lists.opensuse.org/opensuse-security-announce/2009-05/msg00000.html
af854a3a-2127-422b-91ae-364da2661108http://openwall.com/lists/oss-security/2009/02/26/1Patch
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/34052Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/34120
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/34362
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/34377
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/35065
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/36074
af854a3a-2127-422b-91ae-364da2661108http://security.gentoo.org/glsa/glsa-200908-01.xml
af854a3a-2127-422b-91ae-364da2661108http://www.debian.org/security/2009/dsa-1734
af854a3a-2127-422b-91ae-364da2661108http://www.opensc-project.org/pipermail/opensc-announce/2009-February/000023.htmlVendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/bid/33922Exploit, Patch
af854a3a-2127-422b-91ae-364da2661108https://exchange.xforce.ibmcloud.com/vulnerabilities/48958
af854a3a-2127-422b-91ae-364da2661108https://www.redhat.com/archives/fedora-package-announce/2009-March/msg00673.html
af854a3a-2127-422b-91ae-364da2661108https://www.redhat.com/archives/fedora-package-announce/2009-March/msg00686.html



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:opensc-project:opensc:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "BEA45D6B-A77B-46F1-89E1-7E42F017D412",
              "versionEndIncluding": "0.11.6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:opensc-project:opensc:0.3.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "7D734B35-BA7F-4219-98DA-FCD55E5A37C0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:opensc-project:opensc:0.3.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "349D5BCA-885C-4948-838E-E3904E49598E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:opensc-project:opensc:0.4.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "471DBF4E-54B8-4776-A0BA-0F65FE02192E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:opensc-project:opensc:0.5.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "9BC7891E-1898-442A-96BB-5B8EE5A5B400",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:opensc-project:opensc:0.6.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "EA4321E6-1D08-489C-948F-2673C30D762C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:opensc-project:opensc:0.6.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "8498096A-19A9-4C09-99C3-CC1C45D6BA40",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:opensc-project:opensc:0.7.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "5028CF13-2807-4813-A542-A1CD6E735CC5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:opensc-project:opensc:0.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "8FD4CB51-068C-4AD2-94AC-59DE20A2AB77",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:opensc-project:opensc:0.8.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "CE75F1ED-E653-482C-B960-42DA2854E974",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:opensc-project:opensc:0.8.0.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "2D8CA0B8-AC3B-4D0F-854D-EDF285EC01CD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:opensc-project:opensc:0.8.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "931CE287-97AF-4B73-BA57-FB9B9AAA7016",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:opensc-project:opensc:0.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "2BA979A3-A34F-4813-8489-C1985E22A398",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:opensc-project:opensc:0.9.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "04701B8B-523A-4148-805C-419336D91CA2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:opensc-project:opensc:0.9.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "2194636B-7F74-4EC2-A02F-CE0F29914D76",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:opensc-project:opensc:0.9.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "E1D617E6-4EEC-4024-92D7-930F9A90F6DF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:opensc-project:opensc:0.9.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "428986EC-328E-49F8-AAE7-EECD97F6B6FC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:opensc-project:opensc:0.9.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "6A64E85D-B1A7-48FB-8438-8173249ED817",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:opensc-project:opensc:0.9.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "940151B8-6466-43D7-A7EB-A28F13DA5B50",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:opensc-project:opensc:0.9.7:b:*:*:*:*:*:*",
              "matchCriteriaId": "0BE84E1D-F765-49E6-84E2-6831A535B67A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:opensc-project:opensc:0.9.7:d:*:*:*:*:*:*",
              "matchCriteriaId": "CE85FABD-20F0-4308-B240-0E460E85CA08",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:opensc-project:opensc:0.9.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "3752BA88-CA7A-4B79-96C4-A5EC9A6C2AC3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:opensc-project:opensc:0.10.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "13234C4B-7598-46B1-A8F0-7C0C863DE4C5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:opensc-project:opensc:0.10.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "FFC7C1A0-83AA-4989-A023-0B22B95133B9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:opensc-project:opensc:0.11.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "B093D7C9-242E-4CC7-9971-71D9AE19A7F7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:opensc-project:opensc:0.11.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "353AFA23-88C0-45AA-B9EF-EF7A4DC6AFE3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:opensc-project:opensc:0.11.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "EA2024C5-238A-4734-B8C6-D4F99EEFBC07",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:opensc-project:opensc:0.11.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "DF611D89-FA24-4421-A8A8-5290629C81D1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:opensc-project:opensc:0.11.3:pre3:*:*:*:*:*:*",
              "matchCriteriaId": "0ECCFF79-6515-42F8-B986-4C06BE1F79D6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:opensc-project:opensc:0.11.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "A74B19CB-8AFB-4A07-9A84-063BFF47E089",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:opensc-project:opensc:0.11.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "9D8F0F04-489E-41A6-B77B-133AC9FC64A3",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "OpenSC before 0.11.7 allows physically proximate attackers to bypass intended PIN requirements and read private data objects via a (1) low level APDU command or (2) debugging tool, as demonstrated by reading the 4601 or 4701 file with the opensc-explorer or opensc-tool program."
    },
    {
      "lang": "es",
      "value": "Vulnerabilidad en OpenSC en versiones anteriores a v0.11.7 que permite a atacantes pr\u00f3ximos f\u00edsicamente evitar los requisitos de autenticaci\u00f3n/validaci\u00f3n de PIN a trav\u00e9s de (1) el comando APDU de bajo nivel o (2) una herramienta de depuraci\u00f3n de errores, como se ha demostrado leyendo el fichero 4601 o 4701 con el programa opensc-explorer o opensc-tool."
    }
  ],
  "id": "CVE-2009-0368",
  "lastModified": "2025-04-09T00:30:58.490",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "LOW",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "LOCAL",
          "authentication": "NONE",
          "availabilityImpact": "NONE",
          "baseScore": 2.1,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "NONE",
          "vectorString": "AV:L/AC:L/Au:N/C:P/I:N/A:N",
          "version": "2.0"
        },
        "exploitabilityScore": 3.9,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2009-03-02T22:30:00.187",
  "references": [
    {
      "source": "cve@mitre.org",
      "url": "http://lists.opensuse.org/opensuse-security-announce/2009-05/msg00000.html"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch"
      ],
      "url": "http://openwall.com/lists/oss-security/2009/02/26/1"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/34052"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://secunia.com/advisories/34120"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://secunia.com/advisories/34362"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://secunia.com/advisories/34377"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://secunia.com/advisories/35065"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://secunia.com/advisories/36074"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://security.gentoo.org/glsa/glsa-200908-01.xml"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.debian.org/security/2009/dsa-1734"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.opensc-project.org/pipermail/opensc-announce/2009-February/000023.html"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Exploit",
        "Patch"
      ],
      "url": "http://www.securityfocus.com/bid/33922"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/48958"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://www.redhat.com/archives/fedora-package-announce/2009-March/msg00673.html"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://www.redhat.com/archives/fedora-package-announce/2009-March/msg00686.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://lists.opensuse.org/opensuse-security-announce/2009-05/msg00000.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch"
      ],
      "url": "http://openwall.com/lists/oss-security/2009/02/26/1"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/34052"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/34120"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/34362"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/34377"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/35065"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/36074"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://security.gentoo.org/glsa/glsa-200908-01.xml"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.debian.org/security/2009/dsa-1734"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.opensc-project.org/pipermail/opensc-announce/2009-February/000023.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Exploit",
        "Patch"
      ],
      "url": "http://www.securityfocus.com/bid/33922"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/48958"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://www.redhat.com/archives/fedora-package-announce/2009-March/msg00673.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://www.redhat.com/archives/fedora-package-announce/2009-March/msg00686.html"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-310"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.


Loading…

Loading…