Synopsis
The remote Debian host is missing one or more security-related updates.
Description
The remote Debian 11 host has packages installed that are affected by multiple vulnerabilities as referenced in the dla-4004 advisory.
------------------------------------------------------------------------- Debian LTS Advisory DLA-4004-1 [email protected] https://www.debian.org/lts/security/ Guilhem Moulin December 28, 2024 https://wiki.debian.org/LTS
-------------------------------------------------------------------------
Package : opensc Version : 0.21.0-1+deb11u1 CVE ID : CVE-2021-34193 CVE-2021-42778 CVE-2021-42779 CVE-2021-42780 CVE-2021-42781 CVE-2021-42782 CVE-2023-2977 CVE-2023-5992 CVE-2023-40660 CVE-2023-40661 CVE-2024-1454 CVE-2024-8443 CVE-2024-45615 CVE-2024-45616 CVE-2024-45617 CVE-2024-45618 CVE-2024-45619 CVE-2024-45620 Debian Bug : 1037021 1055521 1055522 1064189 1082853 1082859 1082860 1082861 1082862 1082863 1082864
Multiple vulnerabilities were found in opensc, a set of libraries and utilities to access smart cards, which could lead to application crash, information leak, or PIN bypass.
CVE-2021-34193
Multiple stack overflow vulnerabilities were discovered in OpenSC smart card middleware via crafted responses to APDUs.
CVE-2021-42778
A heap double free issue was found in sc_pkcs15_free_tokeninfo().
CVE-2021-42779
A heap use after free issue was found in sc_file_valid().
CVE-2021-42780
A use after return issue was found in the insert_pin() function, which could potentially crash programs using the library.
CVE-2021-42781
Multiple heap buffer overflow issues were found in pkcs15-oberthur.c, which could potentially crash programs using the library.
CVE-2021-42782
Multiple buffer overflow issues were found in various places, which could potentially crash programs using the library.
CVE-2023-2977
A buffer overrun vulnerability was found in pkcs15's cardos_have_verifyrc_package(). When supplying a smart card package with malformed ASN.1 context, an attacker can trigger a crash or information leak via heap-based buffer out-of-bound read.
CVE-2023-5992
Alicja Karion discovered that the code handling the PKCS#1.5 encryption padding removal was not implemented in side-channel resistant way, which can lead to decryption of previously captured RSA ciphertexts and forging of signatures based on the timing data (Marvin attack).
CVE-2023-40660
Deepanjan Pal discovered a potential PIN bypass with empty PIN.
When the token/card was plugged into the computer and authenticated from one process, it could be used to provide cryptographic operations from different process when the empty, zero-length PIN was provided.
CVE-2023-40661
Multiple memory vulnerabilities were found by dynamic analyzers in pkcs15-init.
CVE-2024-1454
A memory use after free issue was found in AuthentIC driver when updating token info.
CVE-2024-8443
An heap buffer overflow issue was found in OpenPGP driver during key generation.
CVE-2024-45615
Matteo Marini discovered multiple uses of uninitialized values in libopensc and pkcs15init.
CVE-2024-45616
Matteo Marini discovered multiple uses of uninitialized values after incorrect check or usage of APDU response values in libopensc.
CVE-2024-45617
Matteo Marini discovered multiple uses of uninitialized values after incorrect or missing checking return values of functions in libopensc.
CVE-2024-45618
Matteo Marini discovered multiple uses of uninitialized values after incorrect or missing checking return values of functions in pkcs15init.
CVE-2024-45619
Matteo Marini discovered multiple incorrect handling of length of buffers or files in libopensc, which could result in application crash or information leak. When buffers are partially filled with data, uninitialized parts of the buffer may be incorrectly accessed.
CVE-2024-45620
Matteo Marini discovered multiple incorrect handling of length of buffers or files in pkcs15init, which could result in application crash or information leak. When buffers are partially filled with data, uninitialized parts of the buffer may be incorrectly accessed.
For Debian 11 bullseye, these problems have been fixed in version 0.21.0-1+deb11u1.
We recommend that you upgrade your opensc packages.
For the detailed security status of opensc please refer to its security tracker page at:
https://security-tracker.debian.org/tracker/opensc
Further information about Debian LTS security advisories, how to apply these updates to your system and frequently asked questions can be found at: https://wiki.debian.org/LTS Attachment:
signature.asc Description: PGP signature
Tenable has extracted the preceding description block directly from the Debian security advisory.
Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.
Solution
Upgrade the opensc packages.
Plugin Details
File Name: debian_DLA-4004.nasl
Agent: unix
Supported Sensors: Frictionless Assessment Agent, Nessus Agent, Agentless Assessment, Continuous Assessment, Nessus
Risk Information
Vector: CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:P
Vector: CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
Temporal Vector: CVSS:3.0/E:P/RL:O/RC:C
Vulnerability Information
CPE: cpe:/o:debian:debian_linux:11.0, p-cpe:/a:debian:debian_linux:opensc, p-cpe:/a:debian:debian_linux:opensc-pkcs11
Required KB Items: Host/local_checks_enabled, Host/Debian/release, Host/Debian/dpkg-l
Exploit Ease: Exploits are available
Patch Publication Date: 12/28/2024
Vulnerability Publication Date: 4/12/2022
Reference Information
CVE: CVE-2021-34193, CVE-2021-42778, CVE-2021-42779, CVE-2021-42780, CVE-2021-42781, CVE-2021-42782, CVE-2023-2977, CVE-2023-40660, CVE-2023-40661, CVE-2023-5992, CVE-2024-1454, CVE-2024-45615, CVE-2024-45616, CVE-2024-45617, CVE-2024-45618, CVE-2024-45619, CVE-2024-45620, CVE-2024-8443