|
Message-ID: <4D11F52C.6060900@redhat.com> Date: Wed, 22 Dec 2010 13:55:08 +0100 From: Jan Lieskovsky <jlieskov@...hat.com> To: "Steven M. Christey" <coley@...us.mitre.org> CC: oss-security <oss-security@...ts.openwall.com>, Robert Relyea <rrelyea@...hat.com> Subject: CVE Request -- 1, ccid -- int.overflow leading to array index error 2, pcsc-lite stack-based buffer overflow in ATR decoder [was: CVE request: opensc buffer overflow ] Hello Josh, Steve, vendors, Rafael Dominguez Vega of MWR InfoSecurity reported two more flaws related with smart cards: I), CCID: Integer overflow, leading to array index error when processing crafted serial number of certain cards Description: An integer overflow, leading to array index error was found in the way USB CCID (Chip/Smart Card Interface Devices) driver processed certain values of card serial number. A local attacker could use this flaw to execute arbitrary code, with the privileges of the user running the pcscd daemon, via a malicious smart card with specially-crafted value of its serial number, inserted to the system USB port. References: [1] http://labs.mwrinfosecurity.com/files/Advisories/mwri_pcsc-libccid-buffer-overflow_2010-12-13.pdf [2] http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=607780 [3] https://bugzilla.redhat.com/show_bug.cgi?id=664986 Upstream changesets: [4] http://lists.alioth.debian.org/pipermail/pcsclite-cvs-commit/2010-November/004934.html [5] http://lists.alioth.debian.org/pipermail/pcsclite-cvs-commit/2010-November/004935.html II), pcsc-lite: Stack-based buffer overflow in Answer-to-Reset (ATR) decoder Description: A stack-based buffer overflow flaw was found in the way PC/SC Lite smart card framework decoded certain attribute values of the Answer-to-Reset (ATR) message, received back from the card after connecting. A local attacker could use this flaw to execute arbitrary code with the privileges of the user running the pcscd daemon, via a malicious smart card inserted to the system USB port. References: [1] http://labs.mwrinfosecurity.com/files/Advisories/mwri_pcsc-atr-handler-buffer-overflow_2010-12-13.pdf [2] http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=607781 [3] http://www.vupen.com/english/advisories/2010/3264 [4] https://bugzilla.redhat.com/show_bug.cgi?id=664999 Upstream changeset: [5] http://lists.alioth.debian.org/pipermail/pcsclite-cvs-commit/2010-November/004923.html Could you allocate CVE ids for these two too? Thanks && Regards, Jan. -- Jan iankko Lieskovsky / Red Hat Security Response Team
Powered by blists - more mailing lists
Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.