5.3 CVE-2021-42780

Patch
 

A use after return issue was found in Opensc before version 0.22.0 in insert_pin function that could potentially crash programs using the library.
https://nvd.nist.gov/vuln/detail/CVE-2021-42780

Categories

CWE-252 : Unchecked Return Value
Two common programmer assumptions are "this function call can never fail" and "it doesn't matter if this function call fails". If an attacker can force the function to fail or otherwise return a value that is not expected, then the subsequent program logic could lead to a vulnerability, because the product is not in a state that the programmer assumes. For example, if the program calls a function to drop privileges but does not check the return code to ensure that privileges were successfully dropped, then the program will continue to operate with the higher privileges.

References


 

CPE

cpe start end
Configuration 1
cpe:2.3:a:opensc_project:opensc:*:*:*:*:*:*:*:* < 0.22.0
Configuration 2
cpe:2.3:o:fedoraproject:fedora:33:*:*:*:*:*:*:*
Configuration 3
cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*


REMEDIATION


Patch

Url
https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=28383
https://bugzilla.redhat.com/show_bug.cgi?id=2016139
https://github.com/OpenSC/OpenSC/commit/5df913b7
https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=28383
https://bugzilla.redhat.com/show_bug.cgi?id=2016139
https://github.com/OpenSC/OpenSC/commit/5df913b7


EXPLOITS


Exploit-db.com

id description date
No known exploits

POC Github

Url
No known exploits

Other Nist (github, ...)

Url
No known exploits


CAPEC


Common Attack Pattern Enumerations and Classifications

id description severity
No entry