CVE-2009-1603

7.5 HIGH
Published: May 11, 2009 Modified: April 23, 2026
View on NVD

Description

src/tools/pkcs11-tool.c in pkcs11-tool in OpenSC 0.11.7, when used with unspecified third-party PKCS#11 modules, generates RSA keys with incorrect public exponents, which allows attackers to read the cleartext form of messages that were intended to be encrypted.

AI Explanation

Get an AI-powered plain-language explanation of this vulnerability and remediation steps.

Login to generate AI explanation

CVSS v3.x Details

0.0 Low Medium High Critical 10.0
Vector String
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N

References to Advisories, Solutions, and Tools

Patch Vendor Advisory Exploit Third Party Advisory
http://secunia.com/advisories/35035
Source: cve@mitre.org
Broken Link
http://secunia.com/advisories/35293
Source: cve@mitre.org
Broken Link
http://secunia.com/advisories/35309
Source: cve@mitre.org
Broken Link
http://secunia.com/advisories/36074
Source: cve@mitre.org
Broken Link
http://security.gentoo.org/glsa/glsa-200908-01.xml
Source: cve@mitre.org
Third Party Advisory
http://www.openwall.com/lists/oss-security/2009/05/08/1
Source: cve@mitre.org
Mailing List Patch
http://www.vupen.com/english/advisories/2009/1295
Source: cve@mitre.org
Broken Link
http://secunia.com/advisories/35035
Source: af854a3a-2127-422b-91ae-364da2661108
Broken Link
http://secunia.com/advisories/35293
Source: af854a3a-2127-422b-91ae-364da2661108
Broken Link
http://secunia.com/advisories/35309
Source: af854a3a-2127-422b-91ae-364da2661108
Broken Link
http://secunia.com/advisories/36074
Source: af854a3a-2127-422b-91ae-364da2661108
Broken Link
http://security.gentoo.org/glsa/glsa-200908-01.xml
Source: af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
http://www.mandriva.com/security/advisories?name=MDVSA-2009:123
Source: af854a3a-2127-422b-91ae-364da2661108
Broken Link
http://www.opensc-project.org/pipermail/opensc-announce/2009-May/000025.html
Source: af854a3a-2127-422b-91ae-364da2661108
Broken Link
http://www.openwall.com/lists/oss-security/2009/05/08/1
Source: af854a3a-2127-422b-91ae-364da2661108
Mailing List Patch
http://www.vupen.com/english/advisories/2009/1295
Source: af854a3a-2127-422b-91ae-364da2661108
Broken Link
https://www.redhat.com/archives/fedora-package-announce/2009-June/msg00095.html
Source: af854a3a-2127-422b-91ae-364da2661108
Mailing List
https://www.redhat.com/archives/fedora-package-announce/2009-June/msg00097.html
Source: af854a3a-2127-422b-91ae-364da2661108
Mailing List
https://www.redhat.com/archives/fedora-package-announce/2009-May/msg01420.html
Source: af854a3a-2127-422b-91ae-364da2661108
Mailing List
https://www.redhat.com/archives/fedora-package-announce/2009-May/msg01432.html
Source: af854a3a-2127-422b-91ae-364da2661108
Mailing List

26 reference(s) from NVD

Quick Stats

CVSS v3 Score
7.5 / 10.0
Exploitation Status
Not in CISA KEV

Weaknesses (CWE)

Affected Vendors

fedoraproject opensc-project