{"containers":{"cna":{"affected":[{"platforms":["Linux"],"product":"HiCOS’ client-side citizen digital certificate","vendor":"HINET","versions":[{"lessThanOrEqual":"11 3.0.3.30306","status":"affected","version":"unspecified","versionType":"custom"}]},{"platforms":["Windows"],"product":"HiCOS’ client-side citizen digital certificate","vendor":"HINET","versions":[{"lessThanOrEqual":"11 3.1.0.00002","status":"affected","version":"unspecified","versionType":"custom"}]},{"platforms":["macOS"],"product":"HiCOS’ client-side citizen digital certificate","vendor":"HINET","versions":[{"lessThanOrEqual":"11 3.0.3.30404","status":"affected","version":"unspecified","versionType":"custom"}]}],"datePublic":"2022-07-12T00:00:00.000Z","descriptions":[{"lang":"en","value":"HICOS’ client-side citizen digital certificate component has a stack-based buffer overflow vulnerability when reading IC card due to insufficient parameter length validation for token information. An unauthenticated physical attacker can exploit this vulnerability to execute arbitrary code, manipulate system data or terminate service."}],"metrics":[{"cvssV3_1":{"attackComplexity":"LOW","attackVector":"PHYSICAL","availabilityImpact":"HIGH","baseScore":6.8,"baseSeverity":"MEDIUM","confidentialityImpact":"HIGH","integrityImpact":"HIGH","privilegesRequired":"NONE","scope":"UNCHANGED","userInteraction":"NONE","vectorString":"CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H","version":"3.1"}}],"problemTypes":[{"descriptions":[{"cweId":"CWE-787","description":"CWE-787 Out-of-bounds Write","lang":"en","type":"CWE"}]}],"providerMetadata":{"dateUpdated":"2022-07-20T02:03:13.000Z","orgId":"cded6c7f-6ce5-4948-8f87-aa7a3bbb6b0e","shortName":"twcert"},"references":[{"tags":["x_refsource_MISC"],"url":"https://www.twcert.org.tw/tw/cp-132-6292-fb267-1.html"}],"solutions":[{"lang":"en","value":"Download latest version"}],"source":{"advisory":"TVN-202206007","discovery":"EXTERNAL"},"title":"HiCOS’ client-side citizen digital certificate - Stack Buffer Overflow","x_generator":{"engine":"Vulnogram 0.0.9"},"x_legacyV4Record":{"CVE_data_meta":{"AKA":"TWCERT/CC","ASSIGNER":"cve@cert.org.tw","DATE_PUBLIC":"2022-07-12T01:33:00.000Z","ID":"CVE-2022-32961","STATE":"PUBLIC","TITLE":"HiCOS’ client-side citizen digital certificate - Stack Buffer Overflow"},"affects":{"vendor":{"vendor_data":[{"product":{"product_data":[{"product_name":"HiCOS’ client-side citizen digital certificate","version":{"version_data":[{"platform":"Linux","version_affected":"<=","version_value":"11 3.0.3.30306"},{"platform":"Windows","version_affected":"<=","version_value":"11 3.1.0.00002"},{"platform":"macOS","version_affected":"<=","version_value":"11 3.0.3.30404"}]}}]},"vendor_name":"HINET"}]}},"data_format":"MITRE","data_type":"CVE","data_version":"4.0","description":{"description_data":[{"lang":"eng","value":"HICOS’ client-side citizen digital certificate component has a stack-based buffer overflow vulnerability when reading IC card due to insufficient parameter length validation for token information. An unauthenticated physical attacker can exploit this vulnerability to execute arbitrary code, manipulate system data or terminate service."}]},"generator":{"engine":"Vulnogram 0.0.9"},"impact":{"cvss":{"attackComplexity":"LOW","attackVector":"PHYSICAL","availabilityImpact":"HIGH","baseScore":6.8,"baseSeverity":"MEDIUM","confidentialityImpact":"HIGH","integrityImpact":"HIGH","privilegesRequired":"NONE","scope":"UNCHANGED","userInteraction":"NONE","vectorString":"CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H","version":"3.1"}},"problemtype":{"problemtype_data":[{"description":[{"lang":"eng","value":"CWE-787 Out-of-bounds Write"}]}]},"references":{"reference_data":[{"name":"https://www.twcert.org.tw/tw/cp-132-6292-fb267-1.html","refsource":"MISC","url":"https://www.twcert.org.tw/tw/cp-132-6292-fb267-1.html"}]},"solution":[{"lang":"en","value":"Download latest version"}],"source":{"advisory":"TVN-202206007","discovery":"EXTERNAL"}}},"adp":[{"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2024-08-03T07:54:03.460Z"},"title":"CVE Program Container","references":[{"tags":["x_refsource_MISC","x_transferred"],"url":"https://www.twcert.org.tw/tw/cp-132-6292-fb267-1.html"}]}]},"cveMetadata":{"assignerOrgId":"cded6c7f-6ce5-4948-8f87-aa7a3bbb6b0e","assignerShortName":"twcert","cveId":"CVE-2022-32961","datePublished":"2022-07-20T02:03:13.812Z","dateReserved":"2022-06-10T00:00:00.000Z","dateUpdated":"2024-09-16T16:53:04.178Z","state":"PUBLISHED"},"dataType":"CVE_RECORD","dataVersion":"5.1"}