cve/2023/CVE-2023-2977.md
2024-05-25 21:48:12 +02:00

18 lines
973 B
Markdown

### [CVE-2023-2977](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2977)
![](https://img.shields.io/static/v1?label=Product&message=OpenSC&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue)
![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-119&color=brighgreen)
### Description
A vulnerbility was found in OpenSC. This security flaw cause a buffer overrun vulnerability in pkcs15 cardos_have_verifyrc_package. The attacker can supply a smart card package with malformed ASN1 context. The cardos_have_verifyrc_package function scans the ASN1 buffer for 2 tags, where remaining length is wrongly caculated due to moved starting pointer. This leads to possible heap-based buffer oob read. In cases where ASAN is enabled while compiling this causes a crash. Further info leak or more damage is possible.
### POC
#### Reference
No PoCs from references.
#### Github
- https://github.com/fullwaywang/QlRules