Versio.io

CVE-2010-0407

Common vulnerabilities & exposures (CVE)

CVE databaseCVE database blogpostRelease & EoL database
 
Published at: - 10-06-2010 02:00
Last modified: - 10-06-2010 02:00
Total changes: - 7

Description

CVE-2009-4901 CVE-2009-4902 CVE-2010-0407 pcsc-lite: Privilege escalation via specially-crafted client to PC/SC Smart Card daemon messages

Common Vulnerability Scoring System (CVSS)

AV:L/AC:H/Au:N/C:C/I:C/A:C
High
Attack complexity
Local
Attack vector
High
Availability
High
Confidentiality
High
Integrity
-
Privileges required
-
Scope
-
User interaction
6.2
Base score
Exploitability score
Impact score
 

Verification logic

OR
AND
product=ant-0 AND versionEndExcluding=1.6.5-1jpp_1rh
vendor=Red Hat Enterprise Linux AND product=certificate_system AND version=7.3
AND
product=avalon-logkit-0 AND versionEndExcluding=1.2-2jpp_4rh
vendor=Red Hat Enterprise Linux AND product=certificate_system AND version=7.3
AND
product=axis-0 AND versionEndExcluding=1.2.1-1jpp_3rh
vendor=Red Hat Enterprise Linux AND product=certificate_system AND version=7.3
AND
product=classpathx-jaf-0 AND versionEndExcluding=1.0-2jpp_6rh
vendor=Red Hat Enterprise Linux AND product=certificate_system AND version=7.3
AND
product=classpathx-mail-0 AND versionEndExcluding=1.1.1-2jpp_8rh
vendor=Red Hat Enterprise Linux AND product=certificate_system AND version=7.3
AND
product=geronimo-specs-0 AND versionEndExcluding=1.0-0.M4.1jpp_10rh
vendor=Red Hat Enterprise Linux AND product=certificate_system AND version=7.3
AND
product=jakarta-commons-modeler-0 AND versionEndExcluding=2.0-3jpp_2rh
vendor=Red Hat Enterprise Linux AND product=certificate_system AND version=7.3
AND
product=log4j-0 AND versionEndExcluding=1.2.12-1jpp_1rh
vendor=Red Hat Enterprise Linux AND product=certificate_system AND version=7.3
AND
product=mx4j-1 AND versionEndExcluding=3.0.1-1jpp_4rh
vendor=Red Hat Enterprise Linux AND product=certificate_system AND version=7.3
AND
product=pcsc-lite-0 AND versionEndExcluding=1.3.3-3.el4
vendor=Red Hat Enterprise Linux AND product=certificate_system AND version=7.3
AND
product=rhpki-ca-0 AND versionEndExcluding=7.3.0-20.el4
vendor=Red Hat Enterprise Linux AND product=certificate_system AND version=7.3
AND
product=rhpki-java-tools-0 AND versionEndExcluding=7.3.0-10.el4
vendor=Red Hat Enterprise Linux AND product=certificate_system AND version=7.3
AND
product=rhpki-kra-0 AND versionEndExcluding=7.3.0-14.el4
vendor=Red Hat Enterprise Linux AND product=certificate_system AND version=7.3
AND
product=rhpki-manage-0 AND versionEndExcluding=7.3.0-19.el4
vendor=Red Hat Enterprise Linux AND product=certificate_system AND version=7.3
AND
product=rhpki-native-tools-0 AND versionEndExcluding=7.3.0-6.el4
vendor=Red Hat Enterprise Linux AND product=certificate_system AND version=7.3
AND
product=rhpki-ocsp-0 AND versionEndExcluding=7.3.0-13.el4
vendor=Red Hat Enterprise Linux AND product=certificate_system AND version=7.3
AND
product=rhpki-tks-0 AND versionEndExcluding=7.3.0-13.el4
vendor=Red Hat Enterprise Linux AND product=certificate_system AND version=7.3
AND
product=Tomcat AND versionEndExcluding=5.5.23-0jpp_4rh.16
vendor=Red Hat Enterprise Linux AND product=certificate_system AND version=7.3
AND
product=xerces-j2-0 AND versionEndExcluding=2.7.1-1jpp_1rh
vendor=Red Hat Enterprise Linux AND product=certificate_system AND version=7.3
AND
product=xml-commons-0 AND versionEndExcluding=1.3.02-2jpp_1rh
vendor=Red Hat Enterprise Linux AND product=certificate_system AND version=7.3
AND
product=pcsc-lite-0 AND versionEndExcluding=1.4.4-4.el5_5
vendor=Red Hat Enterprise Linux AND product=enterprise_linux AND version=5
AND
product=pcsc-lite AND version=
vendor=Red Hat Enterprise Linux AND product=certificate_system AND version=7.2
AND
product=pcsc-lite AND version=
vendor=Red Hat Enterprise Linux AND product=enterprise_linux AND version=6
 

Reference

 


Keywords

REDHAT

 

CVE-2010-0407

 

CVE

 

Common vulnerabilities & exposures

 

CVSS

 

Common vulnerability scoring system

 

Security

 

Vulnerabilities

 

Exposures

 

We use cookies to ensure that we give you the best experience on our website. Read privacy policies for more information.