The reported issues are part of the card enrollment process using the pkcs15-init tool. The attack requires a crafted USB device or smart card that would present the system with specially crafted responses to the APDUs, so they are considered high complexity and low severity. Insufficient or missing checking of return values of functions leads to unexpected work with variables that have not been initialized. The uninitialized variables were reflected in the following functions: - strlen, called from set_string - sc_build_pin - DES_set_key_unchecked, called from openssl_enc Originally reported by Matteo Marini (Sapienza University of Rome)