Metrics
Affected Vendors & Products
Tue, 01 Oct 2024 13:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
cvssV3_1
|
cvssV3_1
|
Thu, 26 Sep 2024 15:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Opensc Project
Opensc Project opensc |
|
Weaknesses | CWE-787 | |
CPEs | cpe:2.3:a:opensc_project:opensc:-:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux:9.0:*:*:*:*:*:*:* |
|
Vendors & Products |
Opensc Project
Opensc Project opensc |
Tue, 10 Sep 2024 15:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Tue, 10 Sep 2024 13:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | No description is available for this CVE. | A heap-based buffer overflow vulnerability was found in the libopensc OpenPGP driver. A crafted USB device or smart card with malicious responses to the APDUs during the card enrollment process using the `pkcs15-init` tool may lead to out-of-bound rights, possibly resulting in arbitrary code execution. |
Title | libopensc: Heap buffer overflow in OpenPGP driver when generating key | Libopensc: heap buffer overflow in openpgp driver when generating key |
First Time appeared |
Redhat
Redhat enterprise Linux |
|
CPEs | cpe:/o:redhat:enterprise_linux:7 cpe:/o:redhat:enterprise_linux:8 cpe:/o:redhat:enterprise_linux:9 |
|
Vendors & Products |
Redhat
Redhat enterprise Linux |
|
References |
|
Fri, 06 Sep 2024 23:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | No description is available for this CVE. | |
Title | libopensc: Heap buffer overflow in OpenPGP driver when generating key | |
Weaknesses | CWE-122 | |
References |
| |
Metrics |
threat_severity
|
cvssV3_1
|
Status: PUBLISHED
Assigner: redhat
Published: 2024-09-10T13:16:51.146Z
Updated: 2024-10-01T12:49:08.577Z
Reserved: 2024-09-04T21:43:13.770Z
Link: CVE-2024-8443
Updated: 2024-09-10T14:47:41.046Z
Status : Modified
Published: 2024-09-10T14:15:13.440
Modified: 2024-10-01T13:15:03.110
Link: CVE-2024-8443