Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
No advisories yet.
Fri, 03 Apr 2026 10:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Opensc
Opensc opensc |
|
| Vendors & Products |
Opensc
Opensc opensc |
Wed, 01 Apr 2026 23:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Opensc Project
Opensc Project opensc |
|
| CPEs | cpe:2.3:a:opensc_project:opensc:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Opensc Project
Opensc Project opensc |
|
| Metrics |
ssvc
|
Tue, 31 Mar 2026 03:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Weaknesses | CWE-805 | |
| References |
| |
| Metrics |
threat_severity
|
threat_severity
|
Mon, 30 Mar 2026 17:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | OpenSC is an open source smart card tools and middleware. Prior to version 0.27.0, sc_compacttlv_find_tag searches a compact-TLV buffer for a given tag. In compact-TLV, a single byte encodes the tag (high nibble) and value length (low nibble). With a 1-byte buffer {0x0A}, the encoded element claims tag=0 and length=10 but no value bytes follow. Calling sc_compacttlv_find_tag with search tag 0x00 returns a pointer equal to buf+1 and outlen=10 without verifying that the claimed value length fits within the remaining buffer. In cases where the sc_compacttlv_find_tag is provided untrusted data (such as being read from cards/files), attackers may be able to influence it to return out-of-bounds pointers leading to downstream memory corruption when subsequent code tries to dereference the pointer. This issue has been patched in version 0.27.0. | |
| Title | OpenSC: `sc_compacttlv_find_tag` can return out-of-bounds pointers | |
| Weaknesses | CWE-126 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2026-04-01T18:15:33.347Z
Reserved: 2025-11-21T01:08:02.615Z
Link: CVE-2025-66038
Updated: 2026-04-01T18:15:28.159Z
Status : Analyzed
Published: 2026-03-30T18:16:18.177
Modified: 2026-04-01T17:40:36.183
Link: CVE-2025-66038
OpenCVE Enrichment
Updated: 2026-04-03T09:11:13Z