GLSA-200812-09 : OpenSC: Insufficient protection of smart card PIN

This script is Copyright (C) 2008-2014 Tenable Network Security, Inc.


Synopsis :

The remote Gentoo host is missing one or more security-related
patches.

Description :

The remote host is affected by the vulnerability described in GLSA-200812-09
(OpenSC: Insufficient protection of smart card PIN)

Chaskiel M Grundman reported that OpenSC uses weak permissions (ADMIN
file control information of 00) for the 5015 directory on smart cards
and USB crypto tokens running Siemens CardOS M4.

Impact :

A physically proximate attacker can exploit this vulnerability to
change the PIN on a smart card and use it for authentication, leading
to privilege escalation.

Workaround :

There is no known workaround at this time.

See also :

http://www.gentoo.org/security/en/glsa/glsa-200812-09.xml

Solution :

All OpenSC users should upgrade to the latest version, and then check
and update their smart cards:
# emerge --sync
# emerge --ask --oneshot --verbose '>=dev-libs/opensc-0.11.6'
# pkcs15-tool --test-update
# pkcs15-tool --test-update --update

Risk factor :

Medium / CVSS Base Score : 4.9
(CVSS2#AV:L/AC:L/Au:N/C:N/I:C/A:N)

Family: Gentoo Local Security Checks

Nessus Plugin ID: 35084 (gentoo_GLSA-200812-09.nasl)

Bugtraq ID:

CVE ID: CVE-2008-2235