![]() |
Home ▼ Bookkeeping
Online ▼ Security
Audits ▼
Managed
DNS ▼
About
Order
FAQ
Acceptable Use Policy
Dynamic DNS Clients
Configure Domains Dyanmic DNS Update Password Network
Monitor ▼
Enterprise Package
Advanced Package
Standard Package
Free Trial
FAQ
Price/Feature Summary
Order/Renew
Examples
Configure/Status Alert Profiles | ||
Test ID: | 1.3.6.1.4.1.25623.1.1.1.1.2009.1734 |
Category: | Debian Local Security Checks |
Title: | Debian: Security Advisory (DSA-1734-1) |
Summary: | The remote host is missing an update for the Debian 'opensc' package(s) announced via the DSA-1734-1 advisory. |
Description: | Summary: The remote host is missing an update for the Debian 'opensc' package(s) announced via the DSA-1734-1 advisory. Vulnerability Insight: b.badrignans discovered that OpenSC, a set of smart card utilities, could stores private data on a smart card without proper access restrictions. Only blank cards initialised with OpenSC are affected by this problem. This update only improves creating new private data objects, but cards already initialised with such private data objects need to be modified to repair the access control conditions on such cards. Instructions for a variety of situations can be found at the OpenSC web site: [link moved to references] The oldstable distribution (etch) is not affected by this problem. For the stable distribution (lenny), this problem has been fixed in version 0.11.4-5+lenny1. For the unstable distribution (sid), this problem wil be fixed soon. We recommend that you upgrade your opensc package and recreate any private data objects stored on your smart cards. Affected Software/OS: 'opensc' package(s) on Debian 5. Solution: Please install the updated package(s). CVSS Score: 2.1 CVSS Vector: AV:L/AC:L/Au:N/C:P/I:N/A:N |
Cross-Ref: |
Common Vulnerability Exposure (CVE) ID: CVE-2009-0368 BugTraq ID: 33922 http://www.securityfocus.com/bid/33922 Debian Security Information: DSA-1734 (Google Search) http://www.debian.org/security/2009/dsa-1734 https://www.redhat.com/archives/fedora-package-announce/2009-March/msg00673.html https://www.redhat.com/archives/fedora-package-announce/2009-March/msg00686.html http://security.gentoo.org/glsa/glsa-200908-01.xml http://www.opensc-project.org/pipermail/opensc-announce/2009-February/000023.html http://openwall.com/lists/oss-security/2009/02/26/1 http://secunia.com/advisories/34052 http://secunia.com/advisories/34120 http://secunia.com/advisories/34362 http://secunia.com/advisories/34377 http://secunia.com/advisories/35065 http://secunia.com/advisories/36074 SuSE Security Announcement: SUSE-SR:2009:010 (Google Search) http://lists.opensuse.org/opensuse-security-announce/2009-05/msg00000.html XForce ISS Database: opensc-pkcs-unauth-access(48958) https://exchange.xforce.ibmcloud.com/vulnerabilities/48958 |
Copyright | Copyright (C) 2023 Greenbone AG |
This is only one of 145615 vulnerability tests in our test suite. Find out more about running a complete security audit. To run a free test of this vulnerability against your system, register below. |