Free and open-source vulnerability scanner

Mageni eases for you the vulnerability scanning, assessment, and management process. It is free and open-source.

Install Now

Available for macOS, Windows, and Linux

App screenshot

Debian Security Advisory DSA 2059-1 (pcsc-lite)

Information

Severity

Severity

Medium

Family

Family

Debian Local Security Checks

CVSSv2 Base

CVSSv2 Base

6.8

CVSSv2 Vector

CVSSv2 Vector

AV:L/AC:L/Au:S/C:C/I:C/A:C

Solution Type

Solution Type

Vendor Patch

Created

Created

13 years ago

Modified

Modified

6 years ago

Summary

The remote host is missing an update to pcsc-lite announced via advisory DSA 2059-1.

Insight

Insight

It was discovered that PCSCD, a daemon to access smart cards, was vulnerable to a buffer overflow allowing a local attacker to elevate his privileges to root. For the stable distribution (lenny), this problem has been fixed in version 1.4.102-1+lenny1. For the unstable distribution (sid), this problem has been fixed in version 1.5.4-1. We recommend that you upgrade your pcsc-lite package.

Solution

Solution

https://secure1.securityspace.com/smysecure/catid.html?in=DSA%202059-1

Common Vulnerabilities and Exposures (CVE)