SUSE SLES12 Security Update : opensc (SUSE-SU-2024:3443-1)

medium Nessus Plugin ID 207781

Synopsis

The remote SUSE host is missing one or more security updates.

Description

The remote SUSE Linux SLES12 / SLES_SAP12 host has a package installed that is affected by multiple vulnerabilities as referenced in the SUSE-SU-2024:3443-1 advisory.

- CVE-2024-45620: Incorrect handling of the length of buffers or files in pkcs15init. (bsc#1230076)
- CVE-2024-45619: Incorrect handling length of buffers or files in libopensc. (bsc#1230075)
- CVE-2024-45618: Uninitialized values after incorrect or missing checking return values of functions in pkcs15init. (bsc#1230074)
- CVE-2024-45617: Uninitialized values after incorrect or missing checking return values of functions in libopensc. (bsc#1230073)
- CVE-2024-45616: Uninitialized values after incorrect check or usage of APDU response values in libopensc. (bsc#1230072)
- CVE-2024-45615: Usage of uninitialized values in libopensc and pkcs15init. (bsc#1230071)
- CVE-2024-8443: Heap buffer overflow in OpenPGP driver when generating key. (bsc#1230364)

Tenable has extracted the preceding description block directly from the SUSE security advisory.

Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.

Solution

Update the affected opensc package.

See Also

https://bugzilla.suse.com/1217722

https://bugzilla.suse.com/1230071

https://bugzilla.suse.com/1230072

https://bugzilla.suse.com/1230073

https://bugzilla.suse.com/1230074

https://bugzilla.suse.com/1230075

https://bugzilla.suse.com/1230076

https://bugzilla.suse.com/1230364

http://www.nessus.org/u?7e9d8cae

https://www.suse.com/security/cve/CVE-2024-45615

https://www.suse.com/security/cve/CVE-2024-45616

https://www.suse.com/security/cve/CVE-2024-45617

https://www.suse.com/security/cve/CVE-2024-45618

https://www.suse.com/security/cve/CVE-2024-45619

https://www.suse.com/security/cve/CVE-2024-45620

https://www.suse.com/security/cve/CVE-2024-8443

Plugin Details

Severity: Medium

ID: 207781

File Name: suse_SU-2024-3443-1.nasl

Version: 1.1

Type: local

Agent: unix

Published: 9/26/2024

Updated: 9/26/2024

Supported Sensors: Frictionless Assessment AWS, Frictionless Assessment Azure, Frictionless Assessment Agent, Nessus Agent, Agentless Assessment, Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 4.2

CVSS v2

Risk Factor: Medium

Base Score: 4.6

Temporal Score: 3.4

Vector: CVSS2#AV:L/AC:L/Au:N/C:P/I:P/A:P

CVSS Score Source: CVE-2024-45619

CVSS v3

Risk Factor: Medium

Base Score: 4.3

Temporal Score: 3.8

Vector: CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L

Temporal Vector: CVSS:3.0/E:U/RL:O/RC:C

Vulnerability Information

CPE: cpe:/o:novell:suse_linux:12, p-cpe:/a:novell:suse_linux:opensc

Required KB Items: Host/local_checks_enabled, Host/cpu, Host/SuSE/release, Host/SuSE/rpm-list

Exploit Ease: No known exploits are available

Patch Publication Date: 9/25/2024

Vulnerability Publication Date: 9/3/2024

Reference Information

CVE: CVE-2024-45615, CVE-2024-45616, CVE-2024-45617, CVE-2024-45618, CVE-2024-45619, CVE-2024-45620, CVE-2024-8443

SuSE: SUSE-SU-2024:3443-1