{"id":"CVE-2009-0368","details":"OpenSC before 0.11.7 allows physically proximate attackers to bypass intended PIN requirements and read private data objects via a (1) low level APDU command or (2) debugging tool, as demonstrated by reading the 4601 or 4701 file with the opensc-explorer or opensc-tool program.","modified":"2026-01-27T04:09:35.905928Z","published":"2009-03-02T22:30:00Z","withdrawn":"2026-01-27T04:09:35.905928Z","related":["openSUSE-SU-2024:10269-1"],"references":[{"type":"ADVISORY","url":"http://secunia.com/advisories/34052"},{"type":"ADVISORY","url":"http://secunia.com/advisories/34120"},{"type":"ADVISORY","url":"http://secunia.com/advisories/34362"},{"type":"ADVISORY","url":"http://secunia.com/advisories/34377"},{"type":"ADVISORY","url":"http://secunia.com/advisories/35065"},{"type":"ADVISORY","url":"http://secunia.com/advisories/36074"},{"type":"ADVISORY","url":"http://security.gentoo.org/glsa/glsa-200908-01.xml"},{"type":"ADVISORY","url":"http://www.debian.org/security/2009/dsa-1734"},{"type":"ADVISORY","url":"http://www.opensc-project.org/pipermail/opensc-announce/2009-February/000023.html"},{"type":"FIX","url":"http://www.securityfocus.com/bid/33922"},{"type":"FIX","url":"http://openwall.com/lists/oss-security/2009/02/26/1"},{"type":"WEB","url":"http://lists.opensuse.org/opensuse-security-announce/2009-05/msg00000.html"},{"type":"WEB","url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/48958"},{"type":"WEB","url":"https://www.redhat.com/archives/fedora-package-announce/2009-March/msg00673.html"},{"type":"WEB","url":"https://www.redhat.com/archives/fedora-package-announce/2009-March/msg00686.html"}],"schema_version":"1.7.3"}