CVE Number – CVE-2019-6502
A vulnerability in the sc_context_create function of OpenSC could allow a local attacker to cause a denial of service (DoS) condition on a targeted system.The vulnerability is in the sc_context_create function, as defined in the ctx.c source code file, and exists because the affected software fails to properly free previously allocated memory. An attacker could exploit this vulnerability by accessing the system and executing an application that submits malicious input to the affected software. A successful exploit could result in a memory leak that the attacker could use to cause a DoS condition on the system.Proof-of-concept (PoC) code that demonstrates an exploit of this vulnerability is publicly available.The vendor has confirmed the vulnerability; however, software updates are not available.
- To exploit this vulnerability, the attacker must have user-level access to the targeted system. This access requirement may reduce the likelihood of a successful exploit.
- Administrators are advised to contact the vendor regarding future updates and releases.Administrators are advised to allow only trusted users to access local systems.Administrators are advised to allow only privileged users to access administration or management systems.Administrators are advised to monitor critical systems.
- The vendor released an issue report at the following link: Issue #1586
- At the time this alert was first published, the vendor had not released a software update.
Duncan is a technology professional with over 20 years experience of working in various IT roles. He also has a wide range of other skills in radio, electronics and telecommunications.