<?xml version="1.0" encoding="UTF-8"?>
<cvrfdoc xmlns:xsd="http://www.w3.org/2001/XMLSchema" xmlns:cpe="http://cpe.mitre.org/language/2.0" xmlns:cvrf="http://docs.oasis-open.org/csaf/ns/csaf-cvrf/v1.2/cvrf" xmlns:cvrf-common="http://docs.oasis-open.org/csaf/ns/csaf-cvrf/v1.2/common" xmlns:cvssv2="http://scap.nist.gov/schema/cvss-v2/1.0" xmlns:cvssv3="https://www.first.org/cvss/cvss-v3.0.xsd" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:ns0="http://purl.org/dc/elements/1.1/" xmlns:prod="http://docs.oasis-open.org/csaf/ns/csaf-cvrf/v1.2/prod" xmlns:scap-core="http://scap.nist.gov/schema/scap-core/1.0" xmlns:sch="http://purl.oclc.org/dsdl/schematron" xmlns:vuln="http://docs.oasis-open.org/csaf/ns/csaf-cvrf/v1.2/vuln" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xmlns="http://docs.oasis-open.org/csaf/ns/csaf-cvrf/v1.2/cvrf">
  <DocumentTitle xml:lang="en">CVE-2008-3972</DocumentTitle>
  <DocumentType>SUSE CVE</DocumentType>
  <DocumentPublisher Type="Vendor">
    <ContactDetails>security@suse.de</ContactDetails>
    <IssuingAuthority>SUSE Security Team</IssuingAuthority>
  </DocumentPublisher>
  <DocumentTracking>
    <Identification>
      <ID>SUSE CVE-2008-3972</ID>
    </Identification>
    <Status>Interim</Status>
    <Version>1</Version>
    <RevisionHistory>
      <Revision>
        <Number>9</Number>
        <Date>2023-12-09T02:08:21Z</Date>
        <Description>current</Description>
      </Revision>
    </RevisionHistory>
    <InitialReleaseDate>2021-05-30T12:43:49Z</InitialReleaseDate>
    <CurrentReleaseDate>2023-12-09T02:08:21Z</CurrentReleaseDate>
    <Generator>
      <Engine>cve-database/bin/generate-cvrf-cve.pl</Engine>
      <Date>2020-12-27T01:00:00Z</Date>
    </Generator>
  </DocumentTracking>
  <DocumentNotes>
    <Note Title="CVE" Type="Summary" Ordinal="1" xml:lang="en">CVE-2008-3972</Note>
    <Note Title="Mitre CVE Description" Type="Description" Ordinal="2" xml:lang="en">pkcs15-tool in OpenSC before 0.11.6 does not apply security updates to a smart card unless the card's label matches the "OpenSC" string, which might allow physically proximate attackers to exploit vulnerabilities that the card owner expected were patched, as demonstrated by exploitation of CVE-2008-2235.</Note>
    <Note Title="Terms of Use" Type="Legal Disclaimer" Ordinal="4" xml:lang="en">The CVRF data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).</Note>
  </DocumentNotes>
  <DocumentReferences>
    <Reference Type="Self">
      <URL>https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/4QRTQOTTCY25HZ4CKOKWXP47HH662BPH/#4QRTQOTTCY25HZ4CKOKWXP47HH662BPH</URL>
      <Description>E-Mail link for SUSE-SR:2008:019</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/security/rating/</URL>
      <Description>SUSE Security Ratings</Description>
    </Reference>
  </DocumentReferences>
  <ProductTree xmlns="http://docs.oasis-open.org/csaf/ns/csaf-cvrf/v1.2/prod">
    <Branch Type="Product Family" Name="SUSE Linux Enterprise High Performance Computing 15-LTSS">
      <Branch Type="Product Name" Name="SUSE Linux Enterprise High Performance Computing 15-LTSS">
        <FullProductName ProductID="SUSE Linux Enterprise High Performance Computing 15-LTSS" CPE="cpe:/o:suse:sle_hpc-ltss:15">SUSE Linux Enterprise High Performance Computing 15-LTSS</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Family" Name="SUSE Linux Enterprise Server 15-ESPOS">
      <Branch Type="Product Name" Name="SUSE Linux Enterprise Server 15-ESPOS">
        <FullProductName ProductID="SUSE Linux Enterprise Server 15-ESPOS" CPE="cpe:/o:suse:sle_hpc-espos:15">SUSE Linux Enterprise Server 15-ESPOS</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Family" Name="SUSE Linux Enterprise Server 15-LTSS">
      <Branch Type="Product Name" Name="SUSE Linux Enterprise Server 15-LTSS">
        <FullProductName ProductID="SUSE Linux Enterprise Server 15-LTSS" CPE="cpe:/o:suse:sles-ltss:15">SUSE Linux Enterprise Server 15-LTSS</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Family" Name="SUSE Linux Enterprise Server for SAP Applications 15">
      <Branch Type="Product Name" Name="SUSE Linux Enterprise Server for SAP Applications 15">
        <FullProductName ProductID="SUSE Linux Enterprise Server for SAP Applications 15" CPE="cpe:/o:suse:sles_sap:15">SUSE Linux Enterprise Server for SAP Applications 15</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Version" Name="opensc">
      <FullProductName ProductID="opensc" CPE="cpe:2.3:a:opensc-project:opensc:*:*:*:*:*:*:*:*">opensc</FullProductName>
    </Branch>
    <Relationship ProductReference="opensc" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise High Performance Computing 15-LTSS">
      <FullProductName ProductID="SUSE Linux Enterprise High Performance Computing 15-LTSS:opensc">opensc as a component of SUSE Linux Enterprise High Performance Computing 15-LTSS</FullProductName>
    </Relationship>
    <Relationship ProductReference="opensc" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server 15-ESPOS">
      <FullProductName ProductID="SUSE Linux Enterprise Server 15-ESPOS:opensc">opensc as a component of SUSE Linux Enterprise Server 15-ESPOS</FullProductName>
    </Relationship>
    <Relationship ProductReference="opensc" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server 15-LTSS">
      <FullProductName ProductID="SUSE Linux Enterprise Server 15-LTSS:opensc">opensc as a component of SUSE Linux Enterprise Server 15-LTSS</FullProductName>
    </Relationship>
    <Relationship ProductReference="opensc" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server for SAP Applications 15">
      <FullProductName ProductID="SUSE Linux Enterprise Server for SAP Applications 15:opensc">opensc as a component of SUSE Linux Enterprise Server for SAP Applications 15</FullProductName>
    </Relationship>
  </ProductTree>
  <Vulnerability xmlns="http://docs.oasis-open.org/csaf/ns/csaf-cvrf/v1.2/vuln" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">pkcs15-tool in OpenSC before 0.11.6 does not apply security updates to a smart card unless the card's label matches the "OpenSC" string, which might allow physically proximate attackers to exploit vulnerabilities that the card owner expected were patched, as demonstrated by exploitation of CVE-2008-2235.</Note>
    </Notes>
    <CVE>CVE-2008-3972</CVE>
    <ProductStatuses>
      <Status Type="Known Not Affected">
        <ProductID>SUSE Linux Enterprise High Performance Computing 15-LTSS:opensc</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15-ESPOS:opensc</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15-LTSS:opensc</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 15:opensc</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSetV2>
        <BaseScoreV2>6.6</BaseScoreV2>
        <VectorV2>AV:L/AC:L/Au:N/C:N/I:C/A:C</VectorV2>
      </ScoreSetV2>
    </CVSSScoreSets>
  </Vulnerability>
</cvrfdoc>
