CVE编号
CVE-2018-16419利用情况
暂无补丁情况
官方补丁披露时间
2018-09-04漏洞描述
能够提供精心制作的智能卡的攻击者可能会使用0.19.0-rc1之前版本的OpenSC的tools / cryptoflex-tool.c中的read_public_key中的Cryptoflex卡处理来自Cryptoflex卡的响应时,一些缓冲区溢出,攻击者可能会使用这些卡来提供精心制作的智能卡,从而导致拒绝服务(应用程序崩溃)或可能具有其他不确定的影响。解决建议
厂商已发布漏洞修复程序,请及时关注更新:https://github.com/OpenSC/OpenSC/commit/360e95d45ac4123255a4c796db96337f332160ad#diff-a6074523a9cbd875e26c58e20868fb15
参考链接 |
|
---|---|
https://access.redhat.com/errata/RHSA-2019:2154 | |
https://github.com/OpenSC/OpenSC/commit/360e95d45ac4123255a4c796db96337f33216... | |
https://github.com/OpenSC/OpenSC/releases/tag/0.19.0-rc1 | |
https://lists.debian.org/debian-lts-announce/2019/09/msg00009.html | |
https://www.x41-dsec.de/lab/advisories/x41-2018-002-OpenSC/ |
受影响软件情况
# | 类型 | 厂商 | 产品 | 版本 | 影响面 | ||||
1 | |||||||||
---|---|---|---|---|---|---|---|---|---|
运行在以下环境 | |||||||||
应用 | opensc_project | opensc | * |
Up to (including) 0.18.0 |
|||||
运行在以下环境 | |||||||||
系统 | alibaba_cloud_linux_2.1903 | opensc | * |
Up to (excluding) 0.19.0-3.1.al7 |
|||||
运行在以下环境 | |||||||||
系统 | alpine_3.10 | opensc | * |
Up to (excluding) 0.19.0-r0 |
|||||
运行在以下环境 | |||||||||
系统 | alpine_3.11 | opensc | * |
Up to (excluding) 0.19.0-r0 |
|||||
运行在以下环境 | |||||||||
系统 | alpine_3.12 | opensc | * |
Up to (excluding) 0.19.0-r0 |
|||||
运行在以下环境 | |||||||||
系统 | alpine_3.13 | opensc | * |
Up to (excluding) 0.19.0-r0 |
|||||
运行在以下环境 | |||||||||
系统 | alpine_3.14 | opensc | * |
Up to (excluding) 0.19.0-r0 |
|||||
运行在以下环境 | |||||||||
系统 | alpine_3.15 | opensc | * |
Up to (excluding) 0.19.0-r0 |
|||||
运行在以下环境 | |||||||||
系统 | alpine_3.9 | opensc | * |
Up to (excluding) 0.19.0-r0 |
|||||
运行在以下环境 | |||||||||
系统 | alpine_edge | opensc | * |
Up to (excluding) 0.19.0-r0 |
|||||
运行在以下环境 | |||||||||
系统 | amazon_2 | opensc | * |
Up to (excluding) 0.19.0-3.amzn2 |
|||||
运行在以下环境 | |||||||||
系统 | debian_8 | opensc | * |
Up to (excluding) 0.16.0-3+deb8u1 |
|||||
运行在以下环境 | |||||||||
系统 | debian_9 | opensc | * |
Up to (excluding) 0.16.0-3+deb9u1 |
|||||
运行在以下环境 | |||||||||
系统 | fedora_28 | opensc | * |
Up to (excluding) 0.19.0-1.fc28 |
|||||
运行在以下环境 | |||||||||
系统 | fedora_29 | opensc | * |
Up to (excluding) 0.19.0-1.fc29 |
|||||
运行在以下环境 | |||||||||
系统 | opensuse_Leap_15.0 | opensc | * |
Up to (excluding) 0.18.0-lp150.2.9.1 |
|||||
运行在以下环境 | |||||||||
系统 | opensuse_Leap_42.3 | opensc | * |
Up to (excluding) 0.13.0-9.3.1 |
|||||
运行在以下环境 | |||||||||
系统 | oracle_7 | opensc | * |
Up to (excluding) 0.19.0-3.el7 |
|||||
运行在以下环境 | |||||||||
系统 | suse_11_SP4 | opensc | * |
Up to (excluding) 0.11.6-5.27.3.1 |
|||||
运行在以下环境 | |||||||||
系统 | suse_12_SP3 | opensc | * |
Up to (excluding) 0.13.0-3.3.2 |
|||||
运行在以下环境 | |||||||||
系统 | suse_12_SP4 | opensc | * |
Up to (excluding) 0.13.0-3.3.2 |
|||||
- 攻击路径 物理
- 攻击复杂度 复杂
- 权限要求 普通权限
- 影响范围 有限影响
- EXP成熟度 未验证
- 补丁情况 官方补丁
- 数据保密性 无影响
- 数据完整性 无影响
- 服务器危害 无影响
- 全网数量 100
还没有评论,来说两句吧...