Red Hat Bugzilla – Bug 487694
CVE-2009-0368 opensc: insufficient access restrictions on private data
Last modified: 2009-06-16 03:10:34 EDT
Upstream released opensc version 0.11.7, fixing a security issue in the private data handling:
Quoting upstream advisory below:
OpenSC Security Advisory [26-Feb-2009] CVE-2009-0368
OpenSC stores private data without proper access restrictions.
User "b.badrignans" reported this security problem on December 4th, 2008.
In June 2007 support form private data objects was added to OpenSC. Only later
a severe security bug was found out: while the OpenSC PKCS#11 implementation
requires PIN verification to access the data, low level APDU commands or
debugging tools like opensc-explorer or opensc-tool can access the private
data without any authentication. This was fixed in OpenSC 0.11.7.
RSA keys are not affected by this security problem. National eID cards and
other cards initialised by other software are not affected by this problem.
Only blank cards initialised with OpenSC are affected by this problem. It is
not known if the problem is limited to some drivers, but we believe all
drivers are affected. We could only test very few cards, but all of them had
the problem, and the fix worked on all of them. All other cards are completely
untested for either.
This fix only improves creating new private data objects. Cards already
initialised with such private data objects need to be modified to repair the
access control conditions on such cards. One way to do that is to erase the
card and re-initialise it, but doing this you would loose all content on the
card, including RSA private keys. An alternative is to download the private
data object(s) to your PC, delete them on the card, and store them once more
on the card with the new, fixed version of OpenSC. This procedure has been
tested with success on some cards, but no guaranty of any kind can be given.
Common Vulnerabilities and Exposures assigned an identifier CVE-2009-0368 to
the following vulnerability:
Reference: MLIST:[opensc-announce] 20090226 OpenSC Security Advisory
Reference: URL: http://www.opensc-project.org/pipermail/opensc-announce/2009-February/000023.html
Reference: MLIST:[oss-security] 20090226 OpenSC Security Advisory
Reference: URL: http://openwall.com/lists/oss-security/2009/02/26/1
Reference: URL: http://www.securityfocus.com/bid/33922
Reference: URL: http://secunia.com/advisories/34052
Reference: URL: http://xforce.iss.net/xforce/xfdb/48958
OpenSC before 0.11.7 allows physically proximate attackers to bypass
intended PIN requirements and read private data objects via a (1) low
level APDU command or (2) debugging tool, as demonstrated by reading
the 4601 or 4701 file with the opensc-explorer or opensc-tool program.
opensc-0.11.7-1.fc9 has been submitted as an update for Fedora 9.
opensc-0.11.7-1.fc10 has been submitted as an update for Fedora 10.
opensc-0.11.7-1.fc10 has been pushed to the Fedora 10 stable repository. If problems still persist, please make note of it in this bug report.
opensc-0.11.7-1.fc9 has been pushed to the Fedora 9 stable repository. If problems still persist, please make note of it in this bug report.