Vulnerabilites related to shibboleth - opensaml
cve-2011-1411
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
http://shibboleth.internet2.edu/secadv/secadv_20110725.txt | x_refsource_CONFIRM | |
http://www.debian.org/security/2011/dsa-2284 | vendor-advisory, x_refsource_DEBIAN | |
http://secunia.com/advisories/50994 | third-party-advisory, x_refsource_SECUNIA | |
http://www.oracle.com/technetwork/topics/security/cpuoct2012-1515893.html | x_refsource_CONFIRM | |
http://www.mandriva.com/security/advisories?name=MDVSA-2013:150 | vendor-advisory, x_refsource_MANDRIVA |
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-06T22:28:40.875Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://shibboleth.internet2.edu/secadv/secadv_20110725.txt", }, { name: "DSA-2284", tags: [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred", ], url: "http://www.debian.org/security/2011/dsa-2284", }, { name: "50994", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/50994", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www.oracle.com/technetwork/topics/security/cpuoct2012-1515893.html", }, { name: "MDVSA-2013:150", tags: [ "vendor-advisory", "x_refsource_MANDRIVA", "x_transferred", ], url: "http://www.mandriva.com/security/advisories?name=MDVSA-2013:150", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "n/a", vendor: "n/a", versions: [ { status: "affected", version: "n/a", }, ], }, ], datePublic: "2011-07-25T00:00:00", descriptions: [ { lang: "en", value: "Shibboleth OpenSAML library 2.4.x before 2.4.3 and 2.5.x before 2.5.1, and IdP before 2.3.2, allows remote attackers to forge messages and bypass authentication via an \"XML Signature wrapping attack.\"", }, ], problemTypes: [ { descriptions: [ { description: "n/a", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2012-10-20T09:00:00", orgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca", shortName: "mitre", }, references: [ { tags: [ "x_refsource_CONFIRM", ], url: "http://shibboleth.internet2.edu/secadv/secadv_20110725.txt", }, { name: "DSA-2284", tags: [ "vendor-advisory", "x_refsource_DEBIAN", ], url: "http://www.debian.org/security/2011/dsa-2284", }, { name: "50994", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/50994", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www.oracle.com/technetwork/topics/security/cpuoct2012-1515893.html", }, { name: "MDVSA-2013:150", tags: [ "vendor-advisory", "x_refsource_MANDRIVA", ], url: "http://www.mandriva.com/security/advisories?name=MDVSA-2013:150", }, ], x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "cve@mitre.org", ID: "CVE-2011-1411", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "n/a", version: { version_data: [ { version_value: "n/a", }, ], }, }, ], }, vendor_name: "n/a", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "Shibboleth OpenSAML library 2.4.x before 2.4.3 and 2.5.x before 2.5.1, and IdP before 2.3.2, allows remote attackers to forge messages and bypass authentication via an \"XML Signature wrapping attack.\"", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "n/a", }, ], }, ], }, references: { reference_data: [ { name: "http://shibboleth.internet2.edu/secadv/secadv_20110725.txt", refsource: "CONFIRM", url: "http://shibboleth.internet2.edu/secadv/secadv_20110725.txt", }, { name: "DSA-2284", refsource: "DEBIAN", url: "http://www.debian.org/security/2011/dsa-2284", }, { name: "50994", refsource: "SECUNIA", url: "http://secunia.com/advisories/50994", }, { name: "http://www.oracle.com/technetwork/topics/security/cpuoct2012-1515893.html", refsource: "CONFIRM", url: "http://www.oracle.com/technetwork/topics/security/cpuoct2012-1515893.html", }, { name: "MDVSA-2013:150", refsource: "MANDRIVA", url: "http://www.mandriva.com/security/advisories?name=MDVSA-2013:150", }, ], }, }, }, }, cveMetadata: { assignerOrgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca", assignerShortName: "mitre", cveId: "CVE-2011-1411", datePublished: "2011-09-02T23:00:00", dateReserved: "2011-03-10T00:00:00", dateUpdated: "2024-08-06T22:28:40.875Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2017-16853
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://www.debian.org/security/2017/dsa-4039 | vendor-advisory, x_refsource_DEBIAN | |
https://bugs.debian.org/881856 | x_refsource_CONFIRM | |
http://www.securityfocus.com/bid/101898 | vdb-entry, x_refsource_BID | |
https://git.shibboleth.net/view/?p=cpp-opensaml.git%3Ba=commit%3Bh=6182b0acf2df670e75423c2ed7afe6950ef11c9d | x_refsource_CONFIRM | |
https://shibboleth.net/community/advisories/secadv_20171115.txt | x_refsource_CONFIRM | |
https://lists.debian.org/debian-lts-announce/2017/11/msg00024.html | mailing-list, x_refsource_MLIST |
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-05T20:35:21.236Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { name: "DSA-4039", tags: [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred", ], url: "https://www.debian.org/security/2017/dsa-4039", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://bugs.debian.org/881856", }, { name: "101898", tags: [ "vdb-entry", "x_refsource_BID", "x_transferred", ], url: "http://www.securityfocus.com/bid/101898", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://git.shibboleth.net/view/?p=cpp-opensaml.git%3Ba=commit%3Bh=6182b0acf2df670e75423c2ed7afe6950ef11c9d", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://shibboleth.net/community/advisories/secadv_20171115.txt", }, { name: "[debian-lts-announce] 20171118 [SECURITY] [DLA 1178-1] opensaml2 security update", tags: [ "mailing-list", "x_refsource_MLIST", "x_transferred", ], url: "https://lists.debian.org/debian-lts-announce/2017/11/msg00024.html", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "n/a", vendor: "n/a", versions: [ { status: "affected", version: "n/a", }, ], }, ], datePublic: "2017-11-16T00:00:00", descriptions: [ { lang: "en", value: "The DynamicMetadataProvider class in saml/saml2/metadata/impl/DynamicMetadataProvider.cpp in OpenSAML-C in OpenSAML before 2.6.1 fails to properly configure itself with the MetadataFilter plugins and does not perform critical security checks such as signature verification, enforcement of validity periods, and other checks specific to deployments, aka CPPOST-105.", }, ], problemTypes: [ { descriptions: [ { description: "n/a", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2018-02-02T10:57:01", orgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca", shortName: "mitre", }, references: [ { name: "DSA-4039", tags: [ "vendor-advisory", "x_refsource_DEBIAN", ], url: "https://www.debian.org/security/2017/dsa-4039", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://bugs.debian.org/881856", }, { name: "101898", tags: [ "vdb-entry", "x_refsource_BID", ], url: "http://www.securityfocus.com/bid/101898", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://git.shibboleth.net/view/?p=cpp-opensaml.git%3Ba=commit%3Bh=6182b0acf2df670e75423c2ed7afe6950ef11c9d", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://shibboleth.net/community/advisories/secadv_20171115.txt", }, { name: "[debian-lts-announce] 20171118 [SECURITY] [DLA 1178-1] opensaml2 security update", tags: [ "mailing-list", "x_refsource_MLIST", ], url: "https://lists.debian.org/debian-lts-announce/2017/11/msg00024.html", }, ], x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "cve@mitre.org", ID: "CVE-2017-16853", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "n/a", version: { version_data: [ { version_value: "n/a", }, ], }, }, ], }, vendor_name: "n/a", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "The DynamicMetadataProvider class in saml/saml2/metadata/impl/DynamicMetadataProvider.cpp in OpenSAML-C in OpenSAML before 2.6.1 fails to properly configure itself with the MetadataFilter plugins and does not perform critical security checks such as signature verification, enforcement of validity periods, and other checks specific to deployments, aka CPPOST-105.", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "n/a", }, ], }, ], }, references: { reference_data: [ { name: "DSA-4039", refsource: "DEBIAN", url: "https://www.debian.org/security/2017/dsa-4039", }, { name: "https://bugs.debian.org/881856", refsource: "CONFIRM", url: "https://bugs.debian.org/881856", }, { name: "101898", refsource: "BID", url: "http://www.securityfocus.com/bid/101898", }, { name: "https://git.shibboleth.net/view/?p=cpp-opensaml.git;a=commit;h=6182b0acf2df670e75423c2ed7afe6950ef11c9d", refsource: "CONFIRM", url: "https://git.shibboleth.net/view/?p=cpp-opensaml.git;a=commit;h=6182b0acf2df670e75423c2ed7afe6950ef11c9d", }, { name: "https://shibboleth.net/community/advisories/secadv_20171115.txt", refsource: "CONFIRM", url: "https://shibboleth.net/community/advisories/secadv_20171115.txt", }, { name: "[debian-lts-announce] 20171118 [SECURITY] [DLA 1178-1] opensaml2 security update", refsource: "MLIST", url: "https://lists.debian.org/debian-lts-announce/2017/11/msg00024.html", }, ], }, }, }, }, cveMetadata: { assignerOrgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca", assignerShortName: "mitre", cveId: "CVE-2017-16853", datePublished: "2017-11-16T17:00:00", dateReserved: "2017-11-16T00:00:00", dateUpdated: "2024-08-05T20:35:21.236Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2013-6440
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
http://rhn.redhat.com/errata/RHSA-2014-0170.html | vendor-advisory, x_refsource_REDHAT | |
http://rhn.redhat.com/errata/RHSA-2014-0195.html | vendor-advisory, x_refsource_REDHAT | |
http://rhn.redhat.com/errata/RHSA-2014-0172.html | vendor-advisory, x_refsource_REDHAT | |
http://rhn.redhat.com/errata/RHSA-2014-0171.html | vendor-advisory, x_refsource_REDHAT | |
https://www.oracle.com/security-alerts/cpujan2022.html | x_refsource_MISC | |
http://blog.sendsafely.com/post/69590974866/web-based-single-sign-on-and-the-dangers-of-saml-xml | x_refsource_MISC | |
http://shibboleth.net/community/advisories/secadv_20131213.txt | x_refsource_CONFIRM | |
https://bugzilla.redhat.com/show_bug.cgi?id=1043332 | x_refsource_CONFIRM |
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-06T17:39:01.299Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { name: "RHSA-2014:0170", tags: [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred", ], url: "http://rhn.redhat.com/errata/RHSA-2014-0170.html", }, { name: "RHSA-2014:0195", tags: [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred", ], url: "http://rhn.redhat.com/errata/RHSA-2014-0195.html", }, { name: "RHSA-2014:0172", tags: [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred", ], url: "http://rhn.redhat.com/errata/RHSA-2014-0172.html", }, { name: "RHSA-2014:0171", tags: [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred", ], url: "http://rhn.redhat.com/errata/RHSA-2014-0171.html", }, { tags: [ "x_refsource_MISC", "x_transferred", ], url: "https://www.oracle.com/security-alerts/cpujan2022.html", }, { tags: [ "x_refsource_MISC", "x_transferred", ], url: "http://blog.sendsafely.com/post/69590974866/web-based-single-sign-on-and-the-dangers-of-saml-xml", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://shibboleth.net/community/advisories/secadv_20131213.txt", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://bugzilla.redhat.com/show_bug.cgi?id=1043332", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "n/a", vendor: "n/a", versions: [ { status: "affected", version: "n/a", }, ], }, ], datePublic: "2013-12-13T00:00:00", descriptions: [ { lang: "en", value: "The (1) BasicParserPool, (2) StaticBasicParserPool, (3) XML Decrypter, and (4) SAML Decrypter in Shibboleth OpenSAML-Java before 2.6.1 set the expandEntityReferences property to true, which allows remote attackers to conduct XML external entity (XXE) attacks via a crafted XML DOCTYPE declaration.", }, ], problemTypes: [ { descriptions: [ { description: "n/a", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2022-02-07T14:39:58", orgId: "53f830b8-0a3f-465b-8143-3b8a9948e749", shortName: "redhat", }, references: [ { name: "RHSA-2014:0170", tags: [ "vendor-advisory", "x_refsource_REDHAT", ], url: "http://rhn.redhat.com/errata/RHSA-2014-0170.html", }, { name: "RHSA-2014:0195", tags: [ "vendor-advisory", "x_refsource_REDHAT", ], url: "http://rhn.redhat.com/errata/RHSA-2014-0195.html", }, { name: "RHSA-2014:0172", tags: [ "vendor-advisory", "x_refsource_REDHAT", ], url: "http://rhn.redhat.com/errata/RHSA-2014-0172.html", }, { name: "RHSA-2014:0171", tags: [ "vendor-advisory", "x_refsource_REDHAT", ], url: "http://rhn.redhat.com/errata/RHSA-2014-0171.html", }, { tags: [ "x_refsource_MISC", ], url: "https://www.oracle.com/security-alerts/cpujan2022.html", }, { tags: [ "x_refsource_MISC", ], url: "http://blog.sendsafely.com/post/69590974866/web-based-single-sign-on-and-the-dangers-of-saml-xml", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://shibboleth.net/community/advisories/secadv_20131213.txt", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://bugzilla.redhat.com/show_bug.cgi?id=1043332", }, ], }, }, cveMetadata: { assignerOrgId: "53f830b8-0a3f-465b-8143-3b8a9948e749", assignerShortName: "redhat", cveId: "CVE-2013-6440", datePublished: "2014-02-14T15:00:00", dateReserved: "2013-11-04T00:00:00", dateUpdated: "2024-08-06T17:39:01.299Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
Vulnerability from fkie_nvd
Vendor | Product | Version | |
---|---|---|---|
shibboleth | opensaml | * | |
debian | debian_linux | 8.0 | |
debian | debian_linux | 9.0 |
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:shibboleth:opensaml:*:*:*:*:*:*:*:*", matchCriteriaId: "056B1868-F286-400A-AD93-69B15BB90E84", versionEndExcluding: "2.6.1", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*", matchCriteriaId: "C11E6FB0-C8C0-4527-9AA0-CB9B316F8F43", vulnerable: true, }, { criteria: "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*", matchCriteriaId: "DEECE5FC-CACF-4496-A3E7-164736409252", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, ], cveTags: [], descriptions: [ { lang: "en", value: "The DynamicMetadataProvider class in saml/saml2/metadata/impl/DynamicMetadataProvider.cpp in OpenSAML-C in OpenSAML before 2.6.1 fails to properly configure itself with the MetadataFilter plugins and does not perform critical security checks such as signature verification, enforcement of validity periods, and other checks specific to deployments, aka CPPOST-105.", }, { lang: "es", value: "La clase DynamicMetadataProvider en saml/saml2/metadata/impl/DynamicMetadataProvider.cpp en OpenSAML-C en OpenSAML, en versiones anteriores a la 2.6.1, no se configura correctamente con los plugins MetadataFilter y no realiza las verificaciones de seguridad críticas como la verificación de firmas, cumplimiento de los periodos de validez y otras comprobaciones específicas de despliegues. Esta vulnerabilidad también se conoce como CPPOST-105.", }, ], id: "CVE-2017-16853", lastModified: "2024-11-21T03:17:06.290", metrics: { cvssMetricV2: [ { acInsufInfo: false, baseSeverity: "MEDIUM", cvssData: { accessComplexity: "MEDIUM", accessVector: "NETWORK", authentication: "NONE", availabilityImpact: "PARTIAL", baseScore: 6.8, confidentialityImpact: "PARTIAL", integrityImpact: "PARTIAL", vectorString: "AV:N/AC:M/Au:N/C:P/I:P/A:P", version: "2.0", }, exploitabilityScore: 8.6, impactScore: 6.4, obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, source: "nvd@nist.gov", type: "Primary", userInteractionRequired: false, }, ], cvssMetricV30: [ { cvssData: { attackComplexity: "HIGH", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 8.1, baseSeverity: "HIGH", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.0", }, exploitabilityScore: 2.2, impactScore: 5.9, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2017-11-16T17:29:00.497", references: [ { source: "cve@mitre.org", tags: [ "Third Party Advisory", "VDB Entry", ], url: "http://www.securityfocus.com/bid/101898", }, { source: "cve@mitre.org", tags: [ "Issue Tracking", "Third Party Advisory", ], url: "https://bugs.debian.org/881856", }, { source: "cve@mitre.org", url: "https://git.shibboleth.net/view/?p=cpp-opensaml.git%3Ba=commit%3Bh=6182b0acf2df670e75423c2ed7afe6950ef11c9d", }, { source: "cve@mitre.org", url: "https://lists.debian.org/debian-lts-announce/2017/11/msg00024.html", }, { source: "cve@mitre.org", tags: [ "Issue Tracking", "Vendor Advisory", ], url: "https://shibboleth.net/community/advisories/secadv_20171115.txt", }, { source: "cve@mitre.org", tags: [ "Issue Tracking", "Third Party Advisory", ], url: "https://www.debian.org/security/2017/dsa-4039", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", "VDB Entry", ], url: "http://www.securityfocus.com/bid/101898", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Issue Tracking", "Third Party Advisory", ], url: "https://bugs.debian.org/881856", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "https://git.shibboleth.net/view/?p=cpp-opensaml.git%3Ba=commit%3Bh=6182b0acf2df670e75423c2ed7afe6950ef11c9d", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "https://lists.debian.org/debian-lts-announce/2017/11/msg00024.html", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Issue Tracking", "Vendor Advisory", ], url: "https://shibboleth.net/community/advisories/secadv_20171115.txt", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Issue Tracking", "Third Party Advisory", ], url: "https://www.debian.org/security/2017/dsa-4039", }, ], sourceIdentifier: "cve@mitre.org", vulnStatus: "Modified", weaknesses: [ { description: [ { lang: "en", value: "CWE-347", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Vulnerability from fkie_nvd
Vendor | Product | Version | |
---|---|---|---|
internet2 | opensaml | 2.0 | |
internet2 | opensaml | 2.1.0 | |
internet2 | opensaml | 2.2.0 | |
shibboleth | opensaml | * | |
shibboleth | opensaml | 2.4.0 | |
shibboleth | opensaml | 2.4.1 | |
shibboleth | opensaml | 2.4.2 | |
shibboleth | opensaml | 2.4.3 | |
shibboleth | opensaml | 2.5.0 | |
shibboleth | opensaml | 2.5.1 | |
shibboleth | opensaml | 2.5.2 | |
shibboleth | opensaml | 2.5.3 |
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:internet2:opensaml:2.0:*:*:*:*:*:*:*", matchCriteriaId: "258372E2-533F-46CB-B25A-5ECB3CC2F22F", vulnerable: true, }, { criteria: "cpe:2.3:a:internet2:opensaml:2.1.0:*:*:*:*:*:*:*", matchCriteriaId: "1122AD73-8FDD-4387-A237-B493CE0D547E", vulnerable: true, }, { criteria: "cpe:2.3:a:internet2:opensaml:2.2.0:*:*:*:*:*:*:*", matchCriteriaId: "0192C838-FD63-4CF7-9BF0-9BAFF101C612", vulnerable: true, }, { criteria: "cpe:2.3:a:shibboleth:opensaml:*:*:*:*:*:*:*:*", matchCriteriaId: "730A8F99-C276-4B6A-B13D-6695EB0E7DAF", versionEndIncluding: "2.6.0", vulnerable: true, }, { criteria: "cpe:2.3:a:shibboleth:opensaml:2.4.0:*:*:*:*:*:*:*", matchCriteriaId: "326C4DAA-C2FE-431E-82AE-5260484EBDC4", vulnerable: true, }, { criteria: "cpe:2.3:a:shibboleth:opensaml:2.4.1:*:*:*:*:*:*:*", matchCriteriaId: "68F5A4FF-96ED-41CD-A83F-3810B9036037", vulnerable: true, }, { criteria: "cpe:2.3:a:shibboleth:opensaml:2.4.2:*:*:*:*:*:*:*", matchCriteriaId: "71772B98-345F-42E0-BBAC-309E24D887B7", vulnerable: true, }, { criteria: "cpe:2.3:a:shibboleth:opensaml:2.4.3:*:*:*:*:*:*:*", matchCriteriaId: "0E61FCA3-83FB-4D2A-8AEC-8F5050B46505", vulnerable: true, }, { criteria: "cpe:2.3:a:shibboleth:opensaml:2.5.0:*:*:*:*:*:*:*", matchCriteriaId: "E7CD6A0B-B78E-4D3C-81E4-27B8E4430F78", vulnerable: true, }, { criteria: "cpe:2.3:a:shibboleth:opensaml:2.5.1:*:*:*:*:*:*:*", matchCriteriaId: "BB9C8839-4531-4E4B-8301-03F0C62A2C99", vulnerable: true, }, { criteria: "cpe:2.3:a:shibboleth:opensaml:2.5.2:*:*:*:*:*:*:*", matchCriteriaId: "E53CF78E-901B-4EEC-8D2C-473A4D229548", vulnerable: true, }, { criteria: "cpe:2.3:a:shibboleth:opensaml:2.5.3:*:*:*:*:*:*:*", matchCriteriaId: "4A61EE41-DB34-4EE0-8CF3-C1F5E6450B85", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, ], cveTags: [], descriptions: [ { lang: "en", value: "The (1) BasicParserPool, (2) StaticBasicParserPool, (3) XML Decrypter, and (4) SAML Decrypter in Shibboleth OpenSAML-Java before 2.6.1 set the expandEntityReferences property to true, which allows remote attackers to conduct XML external entity (XXE) attacks via a crafted XML DOCTYPE declaration.", }, { lang: "es", value: "(1) BasicParserPool, (2) StaticBasicParserPool, (3) XML Decrypter y (4) SAML Decrypter en Shibboleth OpenSAML-Java anterior a 2.6.1 establece la propiedad expandEntityReferences como \"true\", lo que permite a atacantes remotos realizar ataques de entidad externa XML (XXE) a través de una declaración XML DOCTYPE manipulada.", }, ], id: "CVE-2013-6440", lastModified: "2025-04-11T00:51:21.963", metrics: { cvssMetricV2: [ { acInsufInfo: false, baseSeverity: "MEDIUM", cvssData: { accessComplexity: "LOW", accessVector: "NETWORK", authentication: "NONE", availabilityImpact: "NONE", baseScore: 5, confidentialityImpact: "PARTIAL", integrityImpact: "NONE", vectorString: "AV:N/AC:L/Au:N/C:P/I:N/A:N", version: "2.0", }, exploitabilityScore: 10, impactScore: 2.9, obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, source: "nvd@nist.gov", type: "Primary", userInteractionRequired: false, }, ], }, published: "2014-02-14T15:55:05.110", references: [ { source: "secalert@redhat.com", url: "http://blog.sendsafely.com/post/69590974866/web-based-single-sign-on-and-the-dangers-of-saml-xml", }, { source: "secalert@redhat.com", url: "http://rhn.redhat.com/errata/RHSA-2014-0170.html", }, { source: "secalert@redhat.com", url: "http://rhn.redhat.com/errata/RHSA-2014-0171.html", }, { source: "secalert@redhat.com", url: "http://rhn.redhat.com/errata/RHSA-2014-0172.html", }, { source: "secalert@redhat.com", url: "http://rhn.redhat.com/errata/RHSA-2014-0195.html", }, { source: "secalert@redhat.com", url: "http://shibboleth.net/community/advisories/secadv_20131213.txt", }, { source: "secalert@redhat.com", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1043332", }, { source: "secalert@redhat.com", url: "https://www.oracle.com/security-alerts/cpujan2022.html", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://blog.sendsafely.com/post/69590974866/web-based-single-sign-on-and-the-dangers-of-saml-xml", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://rhn.redhat.com/errata/RHSA-2014-0170.html", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://rhn.redhat.com/errata/RHSA-2014-0171.html", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://rhn.redhat.com/errata/RHSA-2014-0172.html", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://rhn.redhat.com/errata/RHSA-2014-0195.html", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://shibboleth.net/community/advisories/secadv_20131213.txt", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1043332", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "https://www.oracle.com/security-alerts/cpujan2022.html", }, ], sourceIdentifier: "secalert@redhat.com", vulnStatus: "Deferred", weaknesses: [ { description: [ { lang: "en", value: "CWE-200", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Vulnerability from fkie_nvd
Vendor | Product | Version | |
---|---|---|---|
shibboleth | opensaml | 2.4.0 | |
shibboleth | opensaml | 2.4.1 | |
shibboleth | opensaml | 2.4.2 | |
shibboleth | opensaml | 2.5.0 | |
shibboleth | shibboleth-identity-provider | * | |
shibboleth | shibboleth-identity-provider | 2.0.0 | |
shibboleth | shibboleth-identity-provider | 2.1.0 | |
shibboleth | shibboleth-identity-provider | 2.1.1 | |
shibboleth | shibboleth-identity-provider | 2.1.2 | |
shibboleth | shibboleth-identity-provider | 2.1.3 | |
shibboleth | shibboleth-identity-provider | 2.1.4 | |
shibboleth | shibboleth-identity-provider | 2.1.5 | |
shibboleth | shibboleth-identity-provider | 2.2.0 | |
shibboleth | shibboleth-identity-provider | 2.2.1 | |
shibboleth | shibboleth-identity-provider | 2.3.0 |
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:shibboleth:opensaml:2.4.0:*:*:*:*:*:*:*", matchCriteriaId: "326C4DAA-C2FE-431E-82AE-5260484EBDC4", vulnerable: true, }, { criteria: "cpe:2.3:a:shibboleth:opensaml:2.4.1:*:*:*:*:*:*:*", matchCriteriaId: "68F5A4FF-96ED-41CD-A83F-3810B9036037", vulnerable: true, }, { criteria: "cpe:2.3:a:shibboleth:opensaml:2.4.2:*:*:*:*:*:*:*", matchCriteriaId: "71772B98-345F-42E0-BBAC-309E24D887B7", vulnerable: true, }, { criteria: "cpe:2.3:a:shibboleth:opensaml:2.5.0:*:*:*:*:*:*:*", matchCriteriaId: "E7CD6A0B-B78E-4D3C-81E4-27B8E4430F78", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:shibboleth:shibboleth-identity-provider:*:*:*:*:*:*:*:*", matchCriteriaId: "6A943122-D2CD-4E2A-A0D5-A3C71B5E62EA", versionEndIncluding: "2.3.1", vulnerable: true, }, { criteria: "cpe:2.3:a:shibboleth:shibboleth-identity-provider:2.0.0:*:*:*:*:*:*:*", matchCriteriaId: "C7AAD703-4FB6-456A-B90E-370F3678FD02", vulnerable: true, }, { criteria: "cpe:2.3:a:shibboleth:shibboleth-identity-provider:2.1.0:*:*:*:*:*:*:*", matchCriteriaId: "8969B3F6-03A3-471A-A023-A261D36995C3", vulnerable: true, }, { criteria: "cpe:2.3:a:shibboleth:shibboleth-identity-provider:2.1.1:*:*:*:*:*:*:*", matchCriteriaId: "4490D05A-8D8E-4445-B404-6B951C50D5F0", vulnerable: true, }, { criteria: "cpe:2.3:a:shibboleth:shibboleth-identity-provider:2.1.2:*:*:*:*:*:*:*", matchCriteriaId: "9DEB9670-E47E-4181-8607-7F2E3C59306B", vulnerable: true, }, { criteria: "cpe:2.3:a:shibboleth:shibboleth-identity-provider:2.1.3:*:*:*:*:*:*:*", matchCriteriaId: "9288EBA7-5975-4CF6-974B-45A12F2B81DB", vulnerable: true, }, { criteria: "cpe:2.3:a:shibboleth:shibboleth-identity-provider:2.1.4:*:*:*:*:*:*:*", matchCriteriaId: "2C5D4672-D1D7-41D3-8AAA-3EA180D5DDCB", vulnerable: true, }, { criteria: "cpe:2.3:a:shibboleth:shibboleth-identity-provider:2.1.5:*:*:*:*:*:*:*", matchCriteriaId: "45AE00EF-707A-42FE-8673-0F1524C0B368", vulnerable: true, }, { criteria: "cpe:2.3:a:shibboleth:shibboleth-identity-provider:2.2.0:*:*:*:*:*:*:*", matchCriteriaId: "5A7BEDBC-8026-459D-8A46-2F23311B23A3", vulnerable: true, }, { criteria: "cpe:2.3:a:shibboleth:shibboleth-identity-provider:2.2.1:*:*:*:*:*:*:*", matchCriteriaId: "857E10D3-3701-45CB-AAD7-31D8990A3DE4", vulnerable: true, }, { criteria: "cpe:2.3:a:shibboleth:shibboleth-identity-provider:2.3.0:*:*:*:*:*:*:*", matchCriteriaId: "5EC7D93A-FB15-4099-BF63-221704CEBA9B", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, ], cveTags: [], descriptions: [ { lang: "en", value: "Shibboleth OpenSAML library 2.4.x before 2.4.3 and 2.5.x before 2.5.1, and IdP before 2.3.2, allows remote attackers to forge messages and bypass authentication via an \"XML Signature wrapping attack.\"", }, { lang: "es", value: "La librería Shibboleth OpenSAML v2.4.x antes de v2.4.3 y v2.5.x antes de v2.5.1, e IdP antes de v2.3.2, permite a atacantes remotos falsificar mensajes y eludir la autenticación a través de un ataque \"XML Signature wrapping\"", }, ], id: "CVE-2011-1411", lastModified: "2025-04-11T00:51:21.963", metrics: { cvssMetricV2: [ { acInsufInfo: false, baseSeverity: "MEDIUM", cvssData: { accessComplexity: "MEDIUM", accessVector: "NETWORK", authentication: "NONE", availabilityImpact: "NONE", baseScore: 5.8, confidentialityImpact: "PARTIAL", integrityImpact: "PARTIAL", vectorString: "AV:N/AC:M/Au:N/C:P/I:P/A:N", version: "2.0", }, exploitabilityScore: 8.6, impactScore: 4.9, obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, source: "nvd@nist.gov", type: "Primary", userInteractionRequired: false, }, ], }, published: "2011-09-02T23:55:04.240", references: [ { source: "cve@mitre.org", url: "http://secunia.com/advisories/50994", }, { source: "cve@mitre.org", tags: [ "Vendor Advisory", ], url: "http://shibboleth.internet2.edu/secadv/secadv_20110725.txt", }, { source: "cve@mitre.org", url: "http://www.debian.org/security/2011/dsa-2284", }, { source: "cve@mitre.org", url: "http://www.mandriva.com/security/advisories?name=MDVSA-2013:150", }, { source: "cve@mitre.org", url: "http://www.oracle.com/technetwork/topics/security/cpuoct2012-1515893.html", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://secunia.com/advisories/50994", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Vendor Advisory", ], url: "http://shibboleth.internet2.edu/secadv/secadv_20110725.txt", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://www.debian.org/security/2011/dsa-2284", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://www.mandriva.com/security/advisories?name=MDVSA-2013:150", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://www.oracle.com/technetwork/topics/security/cpuoct2012-1515893.html", }, ], sourceIdentifier: "cve@mitre.org", vulnStatus: "Deferred", weaknesses: [ { description: [ { lang: "en", value: "CWE-287", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
var-201508-0600
Vulnerability from variot
XMLTooling-C before 1.5.5, as used in OpenSAML-C and Shibboleth Service Provider (SP), does not properly handle integer conversion exceptions, which allows remote attackers to cause a denial of service (crash) via schema-invalid XML data. WebAccess HMI/SCADA software provides remote control and management, allowing users to easily view and configure automation equipment in facility management systems, power stations and building automation systems. A security vulnerability exists in versions prior to Advantech WebAccess 8.1 that could be exploited by a remote attacker to cause a denial of service (out of bounds memory access). XMLTooling-C is prone to a denial-of-service vulnerability. Remote attackers can exploit this issue to cause the application using affected library to crash, denying service to legitimate users. -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA512
Debian Security Advisory DSA-3321-1 security@debian.org https://www.debian.org/security/ Alessandro Ghedini July 30, 2015 https://www.debian.org/security/faq
Package : xmltooling CVE ID : CVE-2015-0851 Debian Bug : 793855
The InCommon Shibboleth Training team discovered that XMLTooling, a C++ XML parsing library, did not properly handle an exception when parsing well-formed but schema-invalid XML.
For the oldstable distribution (wheezy), this problem has been fixed in version 1.4.2-5+deb7u1.
For the stable distribution (jessie), this problem has been fixed in version 1.5.3-2+deb8u1.
For the unstable distribution (sid), this problem will be fixed shortly.
We recommend that you upgrade your xmltooling packages.
Further information about Debian Security Advisories, how to apply these updates to your system and frequently asked questions can be found at: https://www.debian.org/security/
Mailing list: debian-security-announce@lists.debian.org -----BEGIN PGP SIGNATURE----- Version: GnuPG v1
iQIcBAEBCgAGBQJVuoLsAAoJEK+lG9bN5XPLpgUP/07/YpmqvpItmNLfLvnE5yRD lLBc5TgD1oOOcV9SWk8fMdwU+YQ/uWOaBOYWXLwmTgriSXZgLSTUVn3BhWp9o7AQ /7E0wCBGrRErx/cQ1FOrRXAaZhXPgimaL9+7RPs+wkruIUyjhzHcj+TR13CkdHIE GI6Ah1NwuMWmqADXZd+XM3nV7Lieg9JBoXxsn0ZSY/7/BwwZh/HSME81+JmEvmTW OL+knet01hwVH39XI7fGgnpfRqxqTNf1gqmAu4Q0lbHcVClLDYtZlPpUQ55/evks rNyFaN5QmzMhZiiAcy6yakVKKFx/fdrAKog9xtfTUicBmkxFREQfy+CjhY7GmY4o o1S4DcV52z5YC3emSHUyQxqlwrKUzJznfVzjCLb289kS7JaySuYRuPM64y33Wyom nqXFZfjzgPIjskBqdxrctabDIcTHy0Mk+97yyMC8R8Wkw/00pzhcu6AIhGczSkCO cyOGOvdaDKFSj0RDqgJWuFtuKiJVSaClMJZTYNJATlKXeHtVHFptSo5POQAFXOEt BBeMRlw+gYhykNIjZTewHhiv/R27bjGaoV1lIcc3MMo6vhbOGmp6rjnMfTUYLO85 eDiiGn406vBB/4C5vvfSBBLpdnm6cSLQHHfLXGpU7wdIh2O1YAIo24Qp6Y9Njo5p p0yQgYhONZ0+MuBclNES =Jzdd -----END PGP SIGNATURE-----
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", affected_products: { "@id": "https://www.variotdbs.pl/ref/affected_products", }, configurations: { "@id": "https://www.variotdbs.pl/ref/configurations", }, credits: { "@id": "https://www.variotdbs.pl/ref/credits", }, cvss: { "@id": "https://www.variotdbs.pl/ref/cvss/", }, description: { "@id": "https://www.variotdbs.pl/ref/description/", }, exploit_availability: { "@id": "https://www.variotdbs.pl/ref/exploit_availability/", }, external_ids: { "@id": "https://www.variotdbs.pl/ref/external_ids/", }, iot: { "@id": "https://www.variotdbs.pl/ref/iot/", }, iot_taxonomy: { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/", }, patch: { "@id": "https://www.variotdbs.pl/ref/patch/", }, problemtype_data: { "@id": "https://www.variotdbs.pl/ref/problemtype_data/", }, references: { "@id": "https://www.variotdbs.pl/ref/references/", }, sources: { "@id": "https://www.variotdbs.pl/ref/sources/", }, sources_release_date: { "@id": "https://www.variotdbs.pl/ref/sources_release_date/", }, sources_update_date: { "@id": "https://www.variotdbs.pl/ref/sources_update_date/", }, threat_type: { "@id": "https://www.variotdbs.pl/ref/threat_type/", }, title: { "@id": "https://www.variotdbs.pl/ref/title/", }, type: { "@id": "https://www.variotdbs.pl/ref/type/", }, }, "@id": "https://www.variotdbs.pl/vuln/VAR-201508-0600", affected_products: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", data: { "@container": "@list", }, sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, "@id": "https://www.variotdbs.pl/ref/sources", }, }, data: [ { model: "xmltooling", scope: "lte", trust: 1, vendor: "xmltooling", version: "1.5.4", }, { model: "opensaml", scope: "lt", trust: 0.8, vendor: "shibboleth", version: "-c 2.5.5", }, { model: "service provider", scope: null, trust: 0.8, vendor: "shibboleth", version: null, }, { model: "xmltooling", scope: "lt", trust: 0.8, vendor: "shibboleth", version: "-c 1.5.5", }, { model: "webaccess", scope: "lt", trust: 0.6, vendor: "advantech", version: "8.1", }, { model: "xmltooling", scope: "eq", trust: 0.6, vendor: "xmltooling", version: "1.5.4", }, { model: "linux sparc", scope: "eq", trust: 0.3, vendor: "debian", version: "6.0", }, { model: "linux s/390", scope: "eq", trust: 0.3, vendor: "debian", version: "6.0", }, { model: "linux powerpc", scope: "eq", trust: 0.3, vendor: "debian", version: "6.0", }, { model: "linux mips", scope: "eq", trust: 0.3, vendor: "debian", version: "6.0", }, { model: "linux ia-64", scope: "eq", trust: 0.3, vendor: "debian", version: "6.0", }, { model: "linux ia-32", scope: "eq", trust: 0.3, vendor: "debian", version: "6.0", }, { model: "linux arm", scope: "eq", trust: 0.3, vendor: "debian", version: "6.0", }, { model: "linux amd64", scope: "eq", trust: 0.3, vendor: "debian", version: "6.0", }, ], sources: [ { db: "CNVD", id: "CNVD-2016-00428", }, { db: "BID", id: "76134", }, { db: "JVNDB", id: "JVNDB-2015-004047", }, { db: "NVD", id: "CVE-2015-0851", }, { db: "CNNVD", id: "CNNVD-201508-095", }, ], }, configurations: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", children: { "@container": "@list", }, cpe_match: { "@container": "@list", }, data: { "@container": "@list", }, nodes: { "@container": "@list", }, }, data: [ { CVE_data_version: "4.0", nodes: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:a:xmltooling_project:xmltooling:*:*:*:*:*:*:*:*", cpe_name: [], versionEndIncluding: "1.5.4", vulnerable: true, }, ], operator: "OR", }, ], }, ], sources: [ { db: "NVD", id: "CVE-2015-0851", }, ], }, credits: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: "Scott Cantor", sources: [ { db: "BID", id: "76134", }, ], trust: 0.3, }, cve: "CVE-2015-0851", cvss: { "@context": { cvssV2: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#", }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2", }, cvssV3: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#", }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/", }, severity: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#", }, "@id": "https://www.variotdbs.pl/ref/cvss/severity", }, sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, "@id": "https://www.variotdbs.pl/ref/sources", }, }, data: [ { cvssV2: [ { acInsufInfo: false, accessComplexity: "LOW", accessVector: "NETWORK", authentication: "NONE", author: "NVD", availabilityImpact: "PARTIAL", baseScore: 5, confidentialityImpact: "NONE", exploitabilityScore: 10, impactScore: 2.9, integrityImpact: "NONE", obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, severity: "MEDIUM", trust: 1, userInteractionRequired: false, vectorString: "AV:N/AC:L/Au:N/C:N/I:N/A:P", version: "2.0", }, { acInsufInfo: null, accessComplexity: "Low", accessVector: "Network", authentication: "None", author: "NVD", availabilityImpact: "Partial", baseScore: 5, confidentialityImpact: "None", exploitabilityScore: null, id: "CVE-2015-0851", impactScore: null, integrityImpact: "None", obtainAllPrivilege: null, obtainOtherPrivilege: null, obtainUserPrivilege: null, severity: "Medium", trust: 0.8, userInteractionRequired: null, vectorString: "AV:N/AC:L/Au:N/C:N/I:N/A:P", version: "2.0", }, { accessComplexity: "LOW", accessVector: "NETWORK", authentication: "NONE", author: "CNVD", availabilityImpact: "PARTIAL", baseScore: 5, confidentialityImpact: "NONE", exploitabilityScore: 10, id: "CNVD-2016-00428", impactScore: 2.9, integrityImpact: "NONE", severity: "MEDIUM", trust: 0.6, vectorString: "AV:N/AC:L/Au:N/C:N/I:N/A:P", version: "2.0", }, ], cvssV3: [], severity: [ { author: "NVD", id: "CVE-2015-0851", trust: 1.8, value: "MEDIUM", }, { author: "CNVD", id: "CNVD-2016-00428", trust: 0.6, value: "MEDIUM", }, { author: "CNNVD", id: "CNNVD-201508-095", trust: 0.6, value: "MEDIUM", }, ], }, ], sources: [ { db: "CNVD", id: "CNVD-2016-00428", }, { db: "JVNDB", id: "JVNDB-2015-004047", }, { db: "NVD", id: "CVE-2015-0851", }, { db: "CNNVD", id: "CNNVD-201508-095", }, ], }, description: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: "XMLTooling-C before 1.5.5, as used in OpenSAML-C and Shibboleth Service Provider (SP), does not properly handle integer conversion exceptions, which allows remote attackers to cause a denial of service (crash) via schema-invalid XML data. WebAccess HMI/SCADA software provides remote control and management, allowing users to easily view and configure automation equipment in facility management systems, power stations and building automation systems. A security vulnerability exists in versions prior to Advantech WebAccess 8.1 that could be exploited by a remote attacker to cause a denial of service (out of bounds memory access). XMLTooling-C is prone to a denial-of-service vulnerability. \nRemote attackers can exploit this issue to cause the application using affected library to crash, denying service to legitimate users. -----BEGIN PGP SIGNED MESSAGE-----\nHash: SHA512\n\n- -------------------------------------------------------------------------\nDebian Security Advisory DSA-3321-1 security@debian.org\nhttps://www.debian.org/security/ Alessandro Ghedini\nJuly 30, 2015 https://www.debian.org/security/faq\n- -------------------------------------------------------------------------\n\nPackage : xmltooling\nCVE ID : CVE-2015-0851\nDebian Bug : 793855\n\nThe InCommon Shibboleth Training team discovered that XMLTooling, a\nC++ XML parsing library, did not properly handle an exception when\nparsing well-formed but schema-invalid XML. \n\nFor the oldstable distribution (wheezy), this problem has been fixed\nin version 1.4.2-5+deb7u1. \n\nFor the stable distribution (jessie), this problem has been fixed in\nversion 1.5.3-2+deb8u1. \n\nFor the unstable distribution (sid), this problem will be fixed shortly. \n\nWe recommend that you upgrade your xmltooling packages. \n\nFurther information about Debian Security Advisories, how to apply\nthese updates to your system and frequently asked questions can be\nfound at: https://www.debian.org/security/\n\nMailing list: debian-security-announce@lists.debian.org\n-----BEGIN PGP SIGNATURE-----\nVersion: GnuPG v1\n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\np0yQgYhONZ0+MuBclNES\n=Jzdd\n-----END PGP SIGNATURE-----\n", sources: [ { db: "NVD", id: "CVE-2015-0851", }, { db: "JVNDB", id: "JVNDB-2015-004047", }, { db: "CNVD", id: "CNVD-2016-00428", }, { db: "BID", id: "76134", }, { db: "PACKETSTORM", id: "132904", }, ], trust: 2.52, }, external_ids: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", data: { "@container": "@list", }, sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: [ { db: "NVD", id: "CVE-2015-0851", trust: 3.4, }, { db: "BID", id: "76134", trust: 1.3, }, { db: "JVNDB", id: "JVNDB-2015-004047", trust: 0.8, }, { db: "CNVD", id: "CNVD-2016-00428", trust: 0.6, }, { db: "CNNVD", id: "CNNVD-201508-095", trust: 0.6, }, { db: "PACKETSTORM", id: "132904", trust: 0.1, }, ], sources: [ { db: "CNVD", id: "CNVD-2016-00428", }, { db: "BID", id: "76134", }, { db: "JVNDB", id: "JVNDB-2015-004047", }, { db: "PACKETSTORM", id: "132904", }, { db: "NVD", id: "CVE-2015-0851", }, { db: "CNNVD", id: "CNNVD-201508-095", }, ], }, id: "VAR-201508-0600", iot: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: true, sources: [ { db: "CNVD", id: "CNVD-2016-00428", }, ], trust: 1.03267184, }, iot_taxonomy: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#", data: { "@container": "@list", }, sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: [ { category: [ "ICS", ], sub_category: null, trust: 0.6, }, ], sources: [ { db: "CNVD", id: "CNVD-2016-00428", }, ], }, last_update_date: "2023-12-18T12:20:39.781000Z", patch: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", data: { "@container": "@list", }, sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: [ { title: "cpp-xmltooling.git / commitdiff", trust: 0.8, url: "https://git.shibboleth.net/view/?p=cpp-xmltooling.git;a=commitdiff;h=2d795c731e6729309044607154978696a87fd900", }, { title: "[21 July 2015]", trust: 0.8, url: "http://shibboleth.net/community/advisories/secadv_20150721.txt", }, { title: "Advantech WebAccess denial of service vulnerability patch", trust: 0.6, url: "https://www.cnvd.org.cn/patchinfo/show/70373", }, { title: "cpp-xmltooling.git-2d795c731e6729309044607154978696a87fd900", trust: 0.6, url: "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=57194", }, ], sources: [ { db: "CNVD", id: "CNVD-2016-00428", }, { db: "JVNDB", id: "JVNDB-2015-004047", }, { db: "CNNVD", id: "CNNVD-201508-095", }, ], }, problemtype_data: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: [ { problemtype: "CWE-189", trust: 1.8, }, ], sources: [ { db: "JVNDB", id: "JVNDB-2015-004047", }, { db: "NVD", id: "CVE-2015-0851", }, ], }, references: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", data: { "@container": "@list", }, sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: [ { trust: 1.6, url: "http://shibboleth.net/community/advisories/secadv_20150721.txt", }, { trust: 1.6, url: "http://www.debian.org/security/2015/dsa-3321", }, { trust: 1.4, url: "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2015-0851", }, { trust: 1, url: "http://www.securityfocus.com/bid/76134", }, { trust: 1, url: "https://git.shibboleth.net/view/?p=cpp-xmltooling.git%3ba=commitdiff%3bh=2d795c731e6729309044607154978696a87fd900", }, { trust: 0.8, url: "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2015-0851", }, { trust: 0.6, url: "https://git.shibboleth.net/view/?p=cpp-xmltooling.git;a=commitdiff;h=2d795c731e6729309044607154978696a87fd900", }, { trust: 0.1, url: "https://nvd.nist.gov/vuln/detail/cve-2015-0851", }, { trust: 0.1, url: "https://www.debian.org/security/", }, { trust: 0.1, url: "https://www.debian.org/security/faq", }, ], sources: [ { db: "CNVD", id: "CNVD-2016-00428", }, { db: "JVNDB", id: "JVNDB-2015-004047", }, { db: "PACKETSTORM", id: "132904", }, { db: "NVD", id: "CVE-2015-0851", }, { db: "CNNVD", id: "CNNVD-201508-095", }, ], }, sources: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", data: { "@container": "@list", }, }, data: [ { db: "CNVD", id: "CNVD-2016-00428", }, { db: "BID", id: "76134", }, { db: "JVNDB", id: "JVNDB-2015-004047", }, { db: "PACKETSTORM", id: "132904", }, { db: "NVD", id: "CVE-2015-0851", }, { db: "CNNVD", id: "CNNVD-201508-095", }, ], }, sources_release_date: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", data: { "@container": "@list", }, }, data: [ { date: "2016-01-25T00:00:00", db: "CNVD", id: "CNVD-2016-00428", }, { date: "2015-07-21T00:00:00", db: "BID", id: "76134", }, { date: "2015-08-13T00:00:00", db: "JVNDB", id: "JVNDB-2015-004047", }, { date: "2015-08-03T01:17:30", db: "PACKETSTORM", id: "132904", }, { date: "2015-08-12T14:59:01.793000", db: "NVD", id: "CVE-2015-0851", }, { date: "2015-08-13T00:00:00", db: "CNNVD", id: "CNNVD-201508-095", }, ], }, sources_update_date: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", data: { "@container": "@list", }, }, data: [ { date: "2016-01-25T00:00:00", db: "CNVD", id: "CNVD-2016-00428", }, { date: "2015-08-12T22:42:00", db: "BID", id: "76134", }, { date: "2015-08-13T00:00:00", db: "JVNDB", id: "JVNDB-2015-004047", }, { date: "2023-11-07T02:23:35.317000", db: "NVD", id: "CVE-2015-0851", }, { date: "2015-08-13T00:00:00", db: "CNNVD", id: "CNNVD-201508-095", }, ], }, threat_type: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: "remote", sources: [ { db: "PACKETSTORM", id: "132904", }, { db: "CNNVD", id: "CNNVD-201508-095", }, ], trust: 0.7, }, title: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: "OpenSAML-C and Shibboleth Service Provider Used in XMLTooling-C Service disruption in (DoS) Vulnerabilities", sources: [ { db: "JVNDB", id: "JVNDB-2015-004047", }, ], trust: 0.8, }, type: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: "digital error", sources: [ { db: "CNNVD", id: "CNNVD-201508-095", }, ], trust: 0.6, }, }