Vulnerability Details : CVE-2019-16058
An issue was discovered in the pam_p11 component 0.2.0 and 0.3.0 for OpenSC. If a smart card creates a signature with a length longer than 256 bytes, this triggers a buffer overflow. This may be the case for RSA keys with 4096 bits depending on the signature scheme.
Vulnerability category: Overflow
Products affected by CVE-2019-16058
- cpe:2.3:a:opensc_project:opensc:0.3.0:*:*:*:*:*:*:*
- cpe:2.3:a:opensc_project:opensc:0.2.0:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2019-16058
0.35%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 56 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2019-16058
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
5.0
|
MEDIUM | AV:N/AC:L/Au:N/C:N/I:N/A:P |
10.0
|
2.9
|
NIST | |
7.5
|
HIGH | CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H |
3.9
|
3.6
|
NIST |
CWE ids for CVE-2019-16058
-
The product performs operations on a memory buffer, but it reads from or writes to a memory location outside the buffer's intended boundary. This may result in read or write operations on unexpected memory locations that could be linked to other variables, data structures, or internal program data.Assigned by: nvd@nist.gov (Primary)
References for CVE-2019-16058
-
https://github.com/OpenSC/pam_p11/commit/d150b60e1e14c261b113f55681419ad1dfa8a76c
Use EVP_PKEY_size() to allocate correct size of signature buffer. (#18) · OpenSC/pam_p11@d150b60 · GitHubPatch;Third Party Advisory
-
http://www.openwall.com/lists/oss-security/2019/09/12/1
oss-security - pam_p11 0.3.1 released
Jump to