Mission and Overview
NVD is the U.S. government repository of standards based vulnerability management data. This data enables automation of vulnerability management, security measurement, and compliance (e.g. FISMA).
Resource Status
NVD contains:
CVE Vulnerabilities
38433
Checklists
128
US-CERT Alerts
179
US-CERT Vuln Notes
2345
OVAL Queries
2517
CPE Names
17819

Last updated: Tue Aug 25 22:00:41 EDT 2009

CVE Publication rate: 17.47

Email List

NVD provides four mailing lists to the public. For information and subscription instructions please visit NVD Mailing Lists

Workload Index

Vulnerability Workload Index: 10.37

About Us
NVD is a product of the NIST Computer Security Division and is sponsored by the Department of Homeland Security's National Cyber Security Division. It supports the U.S. government multi-agency (OSD, DHS, NSA, DISA, and NIST) Information Security Automation Program. It is the U.S. government content repository for the Security Content Automation Protocol (SCAP).

National Cyber-Alert System

Vulnerability Summary for CVE-2008-2235

Original release date:08/01/2008
Last revised:03/25/2009
Source: US-CERT/NIST

Overview

OpenSC before 0.11.5 uses weak permissions (ADMIN file control information of 00) for the 5015 directory on smart cards and USB crypto tokens running Siemens CardOS M4, which allows physically proximate attackers to change the PIN.

Impact

CVSS Severity (version 2.0):
CVSS v2 Base Score:4.9 (MEDIUM) (AV:L/AC:L/Au:N/C:N/I:C/A:N) (legend)
Impact Subscore: 6.9
Exploitability Subscore: 3.9
CVSS Version 2 Metrics:
Access Vector: Locally exploitable
Access Complexity: Low
Authentication: Not required to exploit
Impact Type:Allows unauthorized modification

Vendor Statments (disclaimer)

Official Statement from Siemens (08/14/2008)
Siemens has analyzed this report and states that no security breach can be found in the Siemens CardOS M4 itself and it thus does not relate to any Siemens component. The reported vulnerability (caused by inappropriate personalization) is due to an issue in the OPENSC middleware detailed information can be found under http://www.opensc-project.org/security.html. Therefore, Siemens recommends all customers and partners using OPENSC to use either the current version 0.11.5 of OPENSC in which this vulnerability is fixed or to use the bug fix suggested under http://freshmeat.net/articles/view/3333/. We hope that we could help you with this recommendation. If you have further questions, please contact the Siemens CardOS hotline under: scs-support.med@siemens.com Phone: +49 89 636 35996 (Mo.-Fr. 9:00-17:00 German time)

References to Advisories, Solutions, and Tools

By selecting these links, you will be leaving NIST webspace. We have provided these links to other web sites because they may have information that would be of interest to you. No inferences should be drawn on account of other sites being referenced, or not, from this page. There may be other web sites that are more appropriate for your purpose. NIST does not necessarily endorse the views expressed, or concur with the facts presented on these sites. Further, NIST does not endorse any commercial products that may be mentioned on these sites. Please address comments about this page to nvd@nist.gov.

External Source: BID
Name: 30473
Type: Patch Information
External Source: FEDORA
Name: FEDORA-2009-2267
External Source: XF
Name: opensc-smartcard-cryptotoken-weak-security(44140)
External Source: CONFIRM
Name: http://www.opensc-project.org/security.html
External Source: MLIST
Name: [opensc-announce] 20080731 OpenSC Security Vulnerability and new Versions of OpenSC, OpenCT, LibP11, Pam_P11, Engine_PKCS11
External Source: MANDRIVA
Name: MDVSA-2008:183
External Source: GENTOO
Name: GLSA-200812-09
External Source: SECUNIA
Name: 34362
External Source: SECUNIA
Name: 33115
External Source: SECUNIA
Name: 32099
External Source: SECUNIA
Name: 31360
External Source: SECUNIA
Name: 31330
External Source: SUSE
Name: SUSE-SR:2009:004
External Source: SUSE
Name: SUSE-SR:2008:019
External Source: DEBIAN
Name: DSA-1627

Vulnerable software and versions

Nav control imageConfiguration 1
spacerNav control imageAND
spacerspacerNav control imageOR
spacerspacerline trunkNav control imagecpe:/o:siemens:cardos:m4
spacerspacerNav control imageOR
spacerspacerspacerNav control image* cpe:/a:opensc-project:opensc:0.11.0
spacerspacerspacerNav control image* cpe:/a:opensc-project:opensc:0.11.1
spacerspacerspacerNav control image* cpe:/a:opensc-project:opensc:0.11.2
spacerspacerspacerNav control image* cpe:/a:opensc-project:opensc:0.11.3
spacerspacerspacerNav control image* cpe:/a:opensc-project:opensc:0.11.3:pre3
spacerspacerspacerNav control image* cpe:/a:opensc-project:opensc:0.11.4
spacerspacerspacerNav control image* cpe:/a:opensc-project:opensc:0.3.2
spacerspacerspacerNav control image* cpe:/a:opensc-project:opensc:0.3.5
spacerspacerspacerNav control image* cpe:/a:opensc-project:opensc:0.4.0
spacerspacerspacerNav control image* cpe:/a:opensc-project:opensc:0.6.0
spacerspacerspacerNav control image* cpe:/a:opensc-project:opensc:0.6.1
spacerspacerspacerNav control image* cpe:/a:opensc-project:opensc:0.7.0
spacerspacerspacerNav control image* cpe:/a:opensc-project:opensc:0.8
spacerspacerspacerNav control image* cpe:/a:opensc-project:opensc:0.8.0.0
spacerspacerspacerNav control image* cpe:/a:opensc-project:opensc:0.8.1
spacerspacerspacerNav control image* cpe:/a:opensc-project:opensc:0.9
spacerspacerspacerNav control image* cpe:/a:opensc-project:opensc:0.9.6
spacerspacerspacerNav control image* cpe:/a:opensc-project:opensc:0.9.7
spacerspacerspacerNav control image* cpe:/a:opensc-project:opensc:0.9.7:b
spacerspacerspacerNav control image* cpe:/a:opensc-project:opensc:0.9.7:d
spacerspacerspacerNav control image* cpe:/a:opensc-project:opensc:0.9.8
* Denotes Vulnerable Software

Technical Details

Vulnerability Type (View All)