{"dataType":"CVE_RECORD","dataVersion":"5.2","cveMetadata":{"cveId":"CVE-2023-4535","assignerOrgId":"53f830b8-0a3f-465b-8143-3b8a9948e749","state":"PUBLISHED","assignerShortName":"redhat","dateReserved":"2023-08-25T07:57:47.663Z","datePublished":"2023-11-06T16:57:45.785Z","dateUpdated":"2025-11-21T06:36:21.112Z"},"containers":{"cna":{"title":"Opensc: out-of-bounds read in myeid driver handling encryption using symmetric keys","metrics":[{"other":{"content":{"value":"Low","namespace":"https://access.redhat.com/security/updates/classification/"},"type":"Red Hat severity rating"}},{"cvssV3_1":{"attackComplexity":"HIGH","attackVector":"PHYSICAL","availabilityImpact":"LOW","baseScore":4.5,"baseSeverity":"MEDIUM","confidentialityImpact":"LOW","integrityImpact":"LOW","privilegesRequired":"NONE","scope":"CHANGED","userInteraction":"REQUIRED","vectorString":"CVSS:3.1/AV:P/AC:H/PR:N/UI:R/S:C/C:L/I:L/A:L","version":"3.1"},"format":"CVSS"}],"descriptions":[{"lang":"en","value":"An out-of-bounds read vulnerability was found in OpenSC packages within the MyEID driver when handling symmetric key encryption. Exploiting this flaw requires an attacker to have physical access to the computer and a specially crafted USB device or smart card. This flaw allows the attacker to manipulate APDU responses and potentially gain unauthorized access to sensitive data, compromising the system's security."}],"affected":[{"vendor":"Red Hat","product":"Red Hat Enterprise Linux 9","collectionURL":"https://access.redhat.com/downloads/content/package-browser/","packageName":"opensc","defaultStatus":"affected","versions":[{"version":"0:0.23.0-3.el9_3","lessThan":"*","versionType":"rpm","status":"unaffected"}],"cpes":["cpe:/o:redhat:enterprise_linux:9::baseos"]},{"vendor":"Red Hat","product":"Red Hat Enterprise Linux 7","collectionURL":"https://access.redhat.com/downloads/content/package-browser/","packageName":"opensc","defaultStatus":"unaffected","cpes":["cpe:/o:redhat:enterprise_linux:7"]},{"vendor":"Red Hat","product":"Red Hat Enterprise Linux 8","collectionURL":"https://access.redhat.com/downloads/content/package-browser/","packageName":"opensc","defaultStatus":"unaffected","cpes":["cpe:/o:redhat:enterprise_linux:8"]}],"references":[{"url":"https://access.redhat.com/errata/RHSA-2023:7879","name":"RHSA-2023:7879","tags":["vendor-advisory","x_refsource_REDHAT"]},{"url":"https://access.redhat.com/security/cve/CVE-2023-4535","tags":["vdb-entry","x_refsource_REDHAT"]},{"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2240914","name":"RHBZ#2240914","tags":["issue-tracking","x_refsource_REDHAT"]},{"url":"https://github.com/OpenSC/OpenSC/commit/f1993dc4e0b33050b8f72a3558ee88b24c4063b2"},{"url":"https://github.com/OpenSC/OpenSC/issues/2792#issuecomment-1674806651"},{"url":"https://github.com/OpenSC/OpenSC/releases/tag/0.24.0-rc1"},{"url":"https://github.com/OpenSC/OpenSC/wiki/OpenSC-security-advisories"}],"datePublic":"2023-09-25T00:00:00.000Z","problemTypes":[{"descriptions":[{"cweId":"CWE-125","description":"Out-of-bounds Read","lang":"en","type":"CWE"}]}],"x_redhatCweChain":"CWE-125: Out-of-bounds Read","timeline":[{"lang":"en","time":"2023-09-27T00:00:00.000Z","value":"Reported to Red Hat."},{"lang":"en","time":"2023-09-25T00:00:00.000Z","value":"Made public."}],"providerMetadata":{"orgId":"53f830b8-0a3f-465b-8143-3b8a9948e749","shortName":"redhat","dateUpdated":"2025-11-21T06:36:21.112Z"}},"adp":[{"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2024-08-02T07:31:05.539Z"},"title":"CVE Program Container","references":[{"url":"https://access.redhat.com/errata/RHSA-2023:7879","name":"RHSA-2023:7879","tags":["vendor-advisory","x_refsource_REDHAT","x_transferred"]},{"url":"https://access.redhat.com/security/cve/CVE-2023-4535","tags":["vdb-entry","x_refsource_REDHAT","x_transferred"]},{"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2240914","name":"RHBZ#2240914","tags":["issue-tracking","x_refsource_REDHAT","x_transferred"]},{"url":"https://github.com/OpenSC/OpenSC/commit/f1993dc4e0b33050b8f72a3558ee88b24c4063b2","tags":["x_transferred"]},{"url":"https://github.com/OpenSC/OpenSC/issues/2792#issuecomment-1674806651","tags":["x_transferred"]},{"url":"https://github.com/OpenSC/OpenSC/releases/tag/0.24.0-rc1","tags":["x_transferred"]},{"url":"https://github.com/OpenSC/OpenSC/wiki/OpenSC-security-advisories","tags":["x_transferred"]},{"url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3CPQOMCDWFRBMEFR5VK4N5MMXXU42ODE/","tags":["x_transferred"]},{"url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GLYEFIBBA37TK3UNMZN5NOJ7IWCIXLQP/","tags":["x_transferred"]}]}]}}