FreeBSD : Use-After-Free Vulnerability in pcsc-lite (c218873d-d444-11e6-84ef-f0def167eeea)

Medium Nessus Plugin ID 96371


The remote FreeBSD host is missing a security-related update.


Peter Wu on Openwall mailing-list reports :

The issue allows a local attacker to cause a Denial of Service, but can potentially result in Privilege Escalation since the daemon is running as root. while any local user can connect to the Unix socket.
Fixed by patch which is released with hpcsc-lite 1.8.20.


Update the affected package.

See Also

Plugin Details

Severity: Medium

ID: 96371

File Name: freebsd_pkg_c218873dd44411e684eff0def167eeea.nasl

Version: $Revision: 3.3 $

Type: local

Published: 2017/01/10

Modified: 2017/03/06

Dependencies: 12634

Risk Information

Risk Factor: Medium


Base Score: 5

Vector: CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:P


Base Score: 7.5

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

Vulnerability Information

CPE: p-cpe:/a:freebsd:freebsd:pcsc-lite, cpe:/o:freebsd:freebsd

Required KB Items: Host/local_checks_enabled, Host/FreeBSD/release, Host/FreeBSD/pkg_info

Patch Publication Date: 2017/01/06

Vulnerability Publication Date: 2017/01/03

Reference Information

CVE: CVE-2016-10109