CVE-2012-5575 (GCVE-0-2012-5575)

Vulnerability from cvelistv5 – Published: 2013-08-19 23:00 – Updated: 2024-08-06 21:14
VLAI?
Summary
Apache CXF 2.5.x before 2.5.10, 2.6.x before CXF 2.6.7, and 2.7.x before CXF 2.7.4 does not verify that a specified cryptographic algorithm is allowed by the WS-SecurityPolicy AlgorithmSuite definition before decrypting, which allows remote attackers to force CXF to use weaker cryptographic algorithms than intended and makes it easier to decrypt communications, aka "XML Encryption backwards compatibility attack."
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
References
http://rhn.redhat.com/errata/RHSA-2013-0943.html vendor-advisoryx_refsource_REDHAT
https://bugzilla.redhat.com/show_bug.cgi?id=880443 x_refsource_CONFIRM
http://rhn.redhat.com/errata/RHSA-2013-0839.html vendor-advisoryx_refsource_REDHAT
http://rhn.redhat.com/errata/RHSA-2013-0875.html vendor-advisoryx_refsource_REDHAT
http://www.securityfocus.com/bid/60043 vdb-entryx_refsource_BID
http://www.nds.ruhr-uni-bochum.de/research/public… x_refsource_MISC
http://rhn.redhat.com/errata/RHSA-2013-0833.html vendor-advisoryx_refsource_REDHAT
http://rhn.redhat.com/errata/RHSA-2013-1437.html vendor-advisoryx_refsource_REDHAT
http://cxf.apache.org/cve-2012-5575.html x_refsource_CONFIRM
http://rhn.redhat.com/errata/RHSA-2013-1143.html vendor-advisoryx_refsource_REDHAT
http://rhn.redhat.com/errata/RHSA-2013-0876.html vendor-advisoryx_refsource_REDHAT
http://rhn.redhat.com/errata/RHSA-2013-1028.html vendor-advisoryx_refsource_REDHAT
http://rhn.redhat.com/errata/RHSA-2013-0834.html vendor-advisoryx_refsource_REDHAT
http://rhn.redhat.com/errata/RHSA-2013-0873.html vendor-advisoryx_refsource_REDHAT
http://rhn.redhat.com/errata/RHSA-2013-0874.html vendor-advisoryx_refsource_REDHAT
https://lists.apache.org/thread.html/rc7742781358… mailing-listx_refsource_MLIST
https://lists.apache.org/thread.html/r36e44ffc1a9… mailing-listx_refsource_MLIST
https://lists.apache.org/thread.html/rff42cfa5e7d… mailing-listx_refsource_MLIST
https://lists.apache.org/thread.html/rd49aabd984e… mailing-listx_refsource_MLIST
https://lists.apache.org/thread.html/rec7160382ba… mailing-listx_refsource_MLIST
https://lists.apache.org/thread.html/rfb87e0bf399… mailing-listx_refsource_MLIST
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-06T21:14:16.301Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "RHSA-2013:0943",
            "tags": [
              "vendor-advisory",
              "x_refsource_REDHAT",
              "x_transferred"
            ],
            "url": "http://rhn.redhat.com/errata/RHSA-2013-0943.html"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://bugzilla.redhat.com/show_bug.cgi?id=880443"
          },
          {
            "name": "RHSA-2013:0839",
            "tags": [
              "vendor-advisory",
              "x_refsource_REDHAT",
              "x_transferred"
            ],
            "url": "http://rhn.redhat.com/errata/RHSA-2013-0839.html"
          },
          {
            "name": "RHSA-2013:0875",
            "tags": [
              "vendor-advisory",
              "x_refsource_REDHAT",
              "x_transferred"
            ],
            "url": "http://rhn.redhat.com/errata/RHSA-2013-0875.html"
          },
          {
            "name": "60043",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/60043"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "http://www.nds.ruhr-uni-bochum.de/research/publications/backwards-compatibility/"
          },
          {
            "name": "RHSA-2013:0833",
            "tags": [
              "vendor-advisory",
              "x_refsource_REDHAT",
              "x_transferred"
            ],
            "url": "http://rhn.redhat.com/errata/RHSA-2013-0833.html"
          },
          {
            "name": "RHSA-2013:1437",
            "tags": [
              "vendor-advisory",
              "x_refsource_REDHAT",
              "x_transferred"
            ],
            "url": "http://rhn.redhat.com/errata/RHSA-2013-1437.html"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://cxf.apache.org/cve-2012-5575.html"
          },
          {
            "name": "RHSA-2013:1143",
            "tags": [
              "vendor-advisory",
              "x_refsource_REDHAT",
              "x_transferred"
            ],
            "url": "http://rhn.redhat.com/errata/RHSA-2013-1143.html"
          },
          {
            "name": "RHSA-2013:0876",
            "tags": [
              "vendor-advisory",
              "x_refsource_REDHAT",
              "x_transferred"
            ],
            "url": "http://rhn.redhat.com/errata/RHSA-2013-0876.html"
          },
          {
            "name": "RHSA-2013:1028",
            "tags": [
              "vendor-advisory",
              "x_refsource_REDHAT",
              "x_transferred"
            ],
            "url": "http://rhn.redhat.com/errata/RHSA-2013-1028.html"
          },
          {
            "name": "RHSA-2013:0834",
            "tags": [
              "vendor-advisory",
              "x_refsource_REDHAT",
              "x_transferred"
            ],
            "url": "http://rhn.redhat.com/errata/RHSA-2013-0834.html"
          },
          {
            "name": "RHSA-2013:0873",
            "tags": [
              "vendor-advisory",
              "x_refsource_REDHAT",
              "x_transferred"
            ],
            "url": "http://rhn.redhat.com/errata/RHSA-2013-0873.html"
          },
          {
            "name": "RHSA-2013:0874",
            "tags": [
              "vendor-advisory",
              "x_refsource_REDHAT",
              "x_transferred"
            ],
            "url": "http://rhn.redhat.com/errata/RHSA-2013-0874.html"
          },
          {
            "name": "[cxf-commits] 20200116 svn commit: r1055336 - in /websites/production/cxf/content: cache/main.pageCache security-advisories.data/CVE-2019-12423.txt.asc security-advisories.data/CVE-2019-17573.txt.asc security-advisories.html",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "https://lists.apache.org/thread.html/rc774278135816e7afc943dc9fc78eb0764f2c84a2b96470a0187315c%40%3Ccommits.cxf.apache.org%3E"
          },
          {
            "name": "[cxf-commits] 20200319 svn commit: r1058035 - in /websites/production/cxf/content: cache/main.pageCache security-advisories.data/CVE-2019-17573.txt.asc security-advisories.html",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "https://lists.apache.org/thread.html/r36e44ffc1a9b365327df62cdfaabe85b9a5637de102cea07d79b2dbf%40%3Ccommits.cxf.apache.org%3E"
          },
          {
            "name": "[cxf-commits] 20200401 svn commit: r1058573 - in /websites/production/cxf/content: cache/main.pageCache index.html security-advisories.data/CVE-2020-1954.txt.asc security-advisories.html",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "https://lists.apache.org/thread.html/rff42cfa5e7d75b7c1af0e37589140a8f1999e578a75738740b244bd4%40%3Ccommits.cxf.apache.org%3E"
          },
          {
            "name": "[cxf-commits] 20201112 svn commit: r1067927 - in /websites/production/cxf/content: cache/main.pageCache security-advisories.data/CVE-2020-13954.txt.asc security-advisories.html",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "https://lists.apache.org/thread.html/rd49aabd984ed540c8ff7916d4d79405f3fa311d2fdbcf9ed307839a6%40%3Ccommits.cxf.apache.org%3E"
          },
          {
            "name": "[cxf-commits] 20210402 svn commit: r1073270 - in /websites/production/cxf/content: cache/main.pageCache security-advisories.data/CVE-2021-22696.txt.asc security-advisories.html",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "https://lists.apache.org/thread.html/rec7160382badd3ef4ad017a22f64a266c7188b9ba71394f0d321e2d4%40%3Ccommits.cxf.apache.org%3E"
          },
          {
            "name": "[cxf-commits] 20210616 svn commit: r1075801 - in /websites/production/cxf/content: cache/main.pageCache index.html security-advisories.data/CVE-2021-30468.txt.asc security-advisories.html",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "https://lists.apache.org/thread.html/rfb87e0bf3995e7d560afeed750fac9329ff5f1ad49da365129b7f89e%40%3Ccommits.cxf.apache.org%3E"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2013-03-27T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Apache CXF 2.5.x before 2.5.10, 2.6.x before CXF 2.6.7, and 2.7.x before CXF 2.7.4 does not verify that a specified cryptographic algorithm is allowed by the WS-SecurityPolicy AlgorithmSuite definition before decrypting, which allows remote attackers to force CXF to use weaker cryptographic algorithms than intended and makes it easier to decrypt communications, aka \"XML Encryption backwards compatibility attack.\""
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2021-06-16T11:06:21",
        "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
        "shortName": "redhat"
      },
      "references": [
        {
          "name": "RHSA-2013:0943",
          "tags": [
            "vendor-advisory",
            "x_refsource_REDHAT"
          ],
          "url": "http://rhn.redhat.com/errata/RHSA-2013-0943.html"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=880443"
        },
        {
          "name": "RHSA-2013:0839",
          "tags": [
            "vendor-advisory",
            "x_refsource_REDHAT"
          ],
          "url": "http://rhn.redhat.com/errata/RHSA-2013-0839.html"
        },
        {
          "name": "RHSA-2013:0875",
          "tags": [
            "vendor-advisory",
            "x_refsource_REDHAT"
          ],
          "url": "http://rhn.redhat.com/errata/RHSA-2013-0875.html"
        },
        {
          "name": "60043",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/60043"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "http://www.nds.ruhr-uni-bochum.de/research/publications/backwards-compatibility/"
        },
        {
          "name": "RHSA-2013:0833",
          "tags": [
            "vendor-advisory",
            "x_refsource_REDHAT"
          ],
          "url": "http://rhn.redhat.com/errata/RHSA-2013-0833.html"
        },
        {
          "name": "RHSA-2013:1437",
          "tags": [
            "vendor-advisory",
            "x_refsource_REDHAT"
          ],
          "url": "http://rhn.redhat.com/errata/RHSA-2013-1437.html"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://cxf.apache.org/cve-2012-5575.html"
        },
        {
          "name": "RHSA-2013:1143",
          "tags": [
            "vendor-advisory",
            "x_refsource_REDHAT"
          ],
          "url": "http://rhn.redhat.com/errata/RHSA-2013-1143.html"
        },
        {
          "name": "RHSA-2013:0876",
          "tags": [
            "vendor-advisory",
            "x_refsource_REDHAT"
          ],
          "url": "http://rhn.redhat.com/errata/RHSA-2013-0876.html"
        },
        {
          "name": "RHSA-2013:1028",
          "tags": [
            "vendor-advisory",
            "x_refsource_REDHAT"
          ],
          "url": "http://rhn.redhat.com/errata/RHSA-2013-1028.html"
        },
        {
          "name": "RHSA-2013:0834",
          "tags": [
            "vendor-advisory",
            "x_refsource_REDHAT"
          ],
          "url": "http://rhn.redhat.com/errata/RHSA-2013-0834.html"
        },
        {
          "name": "RHSA-2013:0873",
          "tags": [
            "vendor-advisory",
            "x_refsource_REDHAT"
          ],
          "url": "http://rhn.redhat.com/errata/RHSA-2013-0873.html"
        },
        {
          "name": "RHSA-2013:0874",
          "tags": [
            "vendor-advisory",
            "x_refsource_REDHAT"
          ],
          "url": "http://rhn.redhat.com/errata/RHSA-2013-0874.html"
        },
        {
          "name": "[cxf-commits] 20200116 svn commit: r1055336 - in /websites/production/cxf/content: cache/main.pageCache security-advisories.data/CVE-2019-12423.txt.asc security-advisories.data/CVE-2019-17573.txt.asc security-advisories.html",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "https://lists.apache.org/thread.html/rc774278135816e7afc943dc9fc78eb0764f2c84a2b96470a0187315c%40%3Ccommits.cxf.apache.org%3E"
        },
        {
          "name": "[cxf-commits] 20200319 svn commit: r1058035 - in /websites/production/cxf/content: cache/main.pageCache security-advisories.data/CVE-2019-17573.txt.asc security-advisories.html",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "https://lists.apache.org/thread.html/r36e44ffc1a9b365327df62cdfaabe85b9a5637de102cea07d79b2dbf%40%3Ccommits.cxf.apache.org%3E"
        },
        {
          "name": "[cxf-commits] 20200401 svn commit: r1058573 - in /websites/production/cxf/content: cache/main.pageCache index.html security-advisories.data/CVE-2020-1954.txt.asc security-advisories.html",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "https://lists.apache.org/thread.html/rff42cfa5e7d75b7c1af0e37589140a8f1999e578a75738740b244bd4%40%3Ccommits.cxf.apache.org%3E"
        },
        {
          "name": "[cxf-commits] 20201112 svn commit: r1067927 - in /websites/production/cxf/content: cache/main.pageCache security-advisories.data/CVE-2020-13954.txt.asc security-advisories.html",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "https://lists.apache.org/thread.html/rd49aabd984ed540c8ff7916d4d79405f3fa311d2fdbcf9ed307839a6%40%3Ccommits.cxf.apache.org%3E"
        },
        {
          "name": "[cxf-commits] 20210402 svn commit: r1073270 - in /websites/production/cxf/content: cache/main.pageCache security-advisories.data/CVE-2021-22696.txt.asc security-advisories.html",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "https://lists.apache.org/thread.html/rec7160382badd3ef4ad017a22f64a266c7188b9ba71394f0d321e2d4%40%3Ccommits.cxf.apache.org%3E"
        },
        {
          "name": "[cxf-commits] 20210616 svn commit: r1075801 - in /websites/production/cxf/content: cache/main.pageCache index.html security-advisories.data/CVE-2021-30468.txt.asc security-advisories.html",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "https://lists.apache.org/thread.html/rfb87e0bf3995e7d560afeed750fac9329ff5f1ad49da365129b7f89e%40%3Ccommits.cxf.apache.org%3E"
        }
      ]
    }
  },
  "cveMetadata": {
    "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
    "assignerShortName": "redhat",
    "cveId": "CVE-2012-5575",
    "datePublished": "2013-08-19T23:00:00",
    "dateReserved": "2012-10-24T00:00:00",
    "dateUpdated": "2024-08-06T21:14:16.301Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1",
  "vulnerability-lookup:meta": {
    "fkie_nvd": {
      "configurations": "[{\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:apache:cxf:2.5.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"D24246B2-915D-494B-9863-CF0B662BE54D\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:apache:cxf:2.5.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"6915B2EC-AA31-44B5-A5F3-3EE1FDD0ABC7\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:apache:cxf:2.5.2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"90280778-F7D6-49E2-9C7F-9F5F58137FDE\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:apache:cxf:2.5.3:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"962F2A85-4731-450B-986B-E1A79986F143\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:apache:cxf:2.5.4:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"49F920D4-1102-4D30-ABD8-F47342DA735A\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:apache:cxf:2.5.5:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"84FD5387-E292-458A-9E8C-85C082461594\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:apache:cxf:2.5.6:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"9D523A5E-24A7-43D7-AE54-02EBF13537D2\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:apache:cxf:2.5.7:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"FC774B3E-D7E4-4FC1-AB09-392EC16F0F76\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:apache:cxf:2.5.8:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"5A1ECB5D-F146-4E4A-BB9A-C96EB5C863A4\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:apache:cxf:2.5.9:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"1138E4D2-7CB6-42C0-91A8-D6C2BDC9F764\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:apache:cxf:2.6.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"A4FC7D67-80A3-43F6-8D46-F13F37A017CF\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:apache:cxf:2.6.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"4F069B04-FDA0-41C3-BCAC-C74A310078B7\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:apache:cxf:2.6.2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"EED986C6-39C6-4F2A-86F7-C2CE9BBE25B4\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:apache:cxf:2.6.3:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"EE5CF2CB-B33D-4C51-84C3-8C10E3E26193\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:apache:cxf:2.6.4:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"7BACD3A8-2FEE-4CB7-9229-06679D6D8150\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:apache:cxf:2.6.5:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"0835933D-4EA4-4C95-8964-984087537268\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:apache:cxf:2.6.6:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"070739FD-9411-4BDB-A96F-3BC4A676A40F\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:apache:cxf:2.7.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"C629A8A7-BFB3-453B-9BCA-3873512410FA\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:apache:cxf:2.7.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"346AF04F-E0C5-45EE-A421-2E1A4E2B57FB\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:apache:cxf:2.7.2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"29777E8F-4DB3-4E9E-9FF4-D13749A7C0AE\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:apache:cxf:2.7.3:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"EA20A9DA-2BEB-4699-A8D4-A90EA036693F\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:redhat:jboss_enterprise_application_platform:5.0.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"F5D7F1AD-4BD3-4C37-B6B5-B287464B2EEB\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:redhat:jboss_enterprise_portal_platform:4.3.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"AC50B7E2-35A0-4D2B-8865-69EF15C7B31E\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:redhat:jboss_enterprise_soa_platform:4.3.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"C57B8004-AF15-4F0F-B9FA-A3CFF7BD42DE\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:redhat:jboss_enterprise_web_platform:5.2.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"38F66D5B-F906-437E-977E-F9F930648886\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:redhat:jboss_fuse_esb_enterprise:7.1.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"658C466F-5DCB-4393-84A9-4B7A93F69724\"}]}]}]",
      "descriptions": "[{\"lang\": \"en\", \"value\": \"Apache CXF 2.5.x before 2.5.10, 2.6.x before CXF 2.6.7, and 2.7.x before CXF 2.7.4 does not verify that a specified cryptographic algorithm is allowed by the WS-SecurityPolicy AlgorithmSuite definition before decrypting, which allows remote attackers to force CXF to use weaker cryptographic algorithms than intended and makes it easier to decrypt communications, aka \\\"XML Encryption backwards compatibility attack.\\\"\"}, {\"lang\": \"es\", \"value\": \"Apache CXF en versiones 2.5.x anteriores a la 2.5.10, 2.6.x anteriores a CXF 2.6.7 y 2.7.x anteriores a CXF 2.7.4 no verifica que un algoritmo criptogr\\u00e1fico espec\\u00edfico est\\u00e9 permitido por la definici\\u00f3n de WS-SecurityPolicy AlgorithmSuite antes del descifrado, lo que permite a los atacantes remotos forzar a CXF a usar algoritmos criptogr\\u00e1ficos m\\u00e1s d\\u00e9biles que los previstos y facilita el descifrado de las comunicaciones. Esto tambi\\u00e9n se conoce como \\\"XML Encryption backwards compatibility attack\\\".\"}]",
      "id": "CVE-2012-5575",
      "lastModified": "2024-11-21T01:44:55.097",
      "metrics": "{\"cvssMetricV2\": [{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"2.0\", \"vectorString\": \"AV:N/AC:L/Au:N/C:P/I:P/A:N\", \"baseScore\": 6.4, \"accessVector\": \"NETWORK\", \"accessComplexity\": \"LOW\", \"authentication\": \"NONE\", \"confidentialityImpact\": \"PARTIAL\", \"integrityImpact\": \"PARTIAL\", \"availabilityImpact\": \"NONE\"}, \"baseSeverity\": \"MEDIUM\", \"exploitabilityScore\": 10.0, \"impactScore\": 4.9, \"acInsufInfo\": false, \"obtainAllPrivilege\": false, \"obtainUserPrivilege\": false, \"obtainOtherPrivilege\": false, \"userInteractionRequired\": false}]}",
      "published": "2013-08-19T23:55:08.127",
      "references": "[{\"url\": \"http://cxf.apache.org/cve-2012-5575.html\", \"source\": \"secalert@redhat.com\"}, {\"url\": \"http://rhn.redhat.com/errata/RHSA-2013-0833.html\", \"source\": \"secalert@redhat.com\"}, {\"url\": \"http://rhn.redhat.com/errata/RHSA-2013-0834.html\", \"source\": \"secalert@redhat.com\"}, {\"url\": \"http://rhn.redhat.com/errata/RHSA-2013-0839.html\", \"source\": \"secalert@redhat.com\"}, {\"url\": \"http://rhn.redhat.com/errata/RHSA-2013-0873.html\", \"source\": \"secalert@redhat.com\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"http://rhn.redhat.com/errata/RHSA-2013-0874.html\", \"source\": \"secalert@redhat.com\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"http://rhn.redhat.com/errata/RHSA-2013-0875.html\", \"source\": \"secalert@redhat.com\"}, {\"url\": \"http://rhn.redhat.com/errata/RHSA-2013-0876.html\", \"source\": \"secalert@redhat.com\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"http://rhn.redhat.com/errata/RHSA-2013-0943.html\", \"source\": \"secalert@redhat.com\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"http://rhn.redhat.com/errata/RHSA-2013-1028.html\", \"source\": \"secalert@redhat.com\"}, {\"url\": \"http://rhn.redhat.com/errata/RHSA-2013-1143.html\", \"source\": \"secalert@redhat.com\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"http://rhn.redhat.com/errata/RHSA-2013-1437.html\", \"source\": \"secalert@redhat.com\"}, {\"url\": \"http://www.nds.ruhr-uni-bochum.de/research/publications/backwards-compatibility/\", \"source\": \"secalert@redhat.com\"}, {\"url\": \"http://www.securityfocus.com/bid/60043\", \"source\": \"secalert@redhat.com\"}, {\"url\": \"https://bugzilla.redhat.com/show_bug.cgi?id=880443\", \"source\": \"secalert@redhat.com\"}, {\"url\": \"https://lists.apache.org/thread.html/r36e44ffc1a9b365327df62cdfaabe85b9a5637de102cea07d79b2dbf%40%3Ccommits.cxf.apache.org%3E\", \"source\": \"secalert@redhat.com\"}, {\"url\": \"https://lists.apache.org/thread.html/rc774278135816e7afc943dc9fc78eb0764f2c84a2b96470a0187315c%40%3Ccommits.cxf.apache.org%3E\", \"source\": \"secalert@redhat.com\"}, {\"url\": \"https://lists.apache.org/thread.html/rd49aabd984ed540c8ff7916d4d79405f3fa311d2fdbcf9ed307839a6%40%3Ccommits.cxf.apache.org%3E\", \"source\": \"secalert@redhat.com\"}, {\"url\": \"https://lists.apache.org/thread.html/rec7160382badd3ef4ad017a22f64a266c7188b9ba71394f0d321e2d4%40%3Ccommits.cxf.apache.org%3E\", \"source\": \"secalert@redhat.com\"}, {\"url\": \"https://lists.apache.org/thread.html/rfb87e0bf3995e7d560afeed750fac9329ff5f1ad49da365129b7f89e%40%3Ccommits.cxf.apache.org%3E\", \"source\": \"secalert@redhat.com\"}, {\"url\": \"https://lists.apache.org/thread.html/rff42cfa5e7d75b7c1af0e37589140a8f1999e578a75738740b244bd4%40%3Ccommits.cxf.apache.org%3E\", \"source\": \"secalert@redhat.com\"}, {\"url\": \"http://cxf.apache.org/cve-2012-5575.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://rhn.redhat.com/errata/RHSA-2013-0833.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://rhn.redhat.com/errata/RHSA-2013-0834.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://rhn.redhat.com/errata/RHSA-2013-0839.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://rhn.redhat.com/errata/RHSA-2013-0873.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"http://rhn.redhat.com/errata/RHSA-2013-0874.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"http://rhn.redhat.com/errata/RHSA-2013-0875.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://rhn.redhat.com/errata/RHSA-2013-0876.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"http://rhn.redhat.com/errata/RHSA-2013-0943.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"http://rhn.redhat.com/errata/RHSA-2013-1028.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://rhn.redhat.com/errata/RHSA-2013-1143.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"http://rhn.redhat.com/errata/RHSA-2013-1437.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://www.nds.ruhr-uni-bochum.de/research/publications/backwards-compatibility/\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://www.securityfocus.com/bid/60043\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"https://bugzilla.redhat.com/show_bug.cgi?id=880443\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"https://lists.apache.org/thread.html/r36e44ffc1a9b365327df62cdfaabe85b9a5637de102cea07d79b2dbf%40%3Ccommits.cxf.apache.org%3E\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"https://lists.apache.org/thread.html/rc774278135816e7afc943dc9fc78eb0764f2c84a2b96470a0187315c%40%3Ccommits.cxf.apache.org%3E\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"https://lists.apache.org/thread.html/rd49aabd984ed540c8ff7916d4d79405f3fa311d2fdbcf9ed307839a6%40%3Ccommits.cxf.apache.org%3E\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"https://lists.apache.org/thread.html/rec7160382badd3ef4ad017a22f64a266c7188b9ba71394f0d321e2d4%40%3Ccommits.cxf.apache.org%3E\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"https://lists.apache.org/thread.html/rfb87e0bf3995e7d560afeed750fac9329ff5f1ad49da365129b7f89e%40%3Ccommits.cxf.apache.org%3E\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"https://lists.apache.org/thread.html/rff42cfa5e7d75b7c1af0e37589140a8f1999e578a75738740b244bd4%40%3Ccommits.cxf.apache.org%3E\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}]",
      "sourceIdentifier": "secalert@redhat.com",
      "vulnStatus": "Modified",
      "weaknesses": "[{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"description\": [{\"lang\": \"en\", \"value\": \"CWE-310\"}]}]"
    },
    "nvd": "{\"cve\":{\"id\":\"CVE-2012-5575\",\"sourceIdentifier\":\"secalert@redhat.com\",\"published\":\"2013-08-19T23:55:08.127\",\"lastModified\":\"2025-04-11T00:51:21.963\",\"vulnStatus\":\"Deferred\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"Apache CXF 2.5.x before 2.5.10, 2.6.x before CXF 2.6.7, and 2.7.x before CXF 2.7.4 does not verify that a specified cryptographic algorithm is allowed by the WS-SecurityPolicy AlgorithmSuite definition before decrypting, which allows remote attackers to force CXF to use weaker cryptographic algorithms than intended and makes it easier to decrypt communications, aka \\\"XML Encryption backwards compatibility attack.\\\"\"},{\"lang\":\"es\",\"value\":\"Apache CXF en versiones 2.5.x anteriores a la 2.5.10, 2.6.x anteriores a CXF 2.6.7 y 2.7.x anteriores a CXF 2.7.4 no verifica que un algoritmo criptogr\u00e1fico espec\u00edfico est\u00e9 permitido por la definici\u00f3n de WS-SecurityPolicy AlgorithmSuite antes del descifrado, lo que permite a los atacantes remotos forzar a CXF a usar algoritmos criptogr\u00e1ficos m\u00e1s d\u00e9biles que los previstos y facilita el descifrado de las comunicaciones. Esto tambi\u00e9n se conoce como \\\"XML Encryption backwards compatibility attack\\\".\"}],\"metrics\":{\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:L/Au:N/C:P/I:P/A:N\",\"baseScore\":6.4,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"LOW\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"PARTIAL\",\"integrityImpact\":\"PARTIAL\",\"availabilityImpact\":\"NONE\"},\"baseSeverity\":\"MEDIUM\",\"exploitabilityScore\":10.0,\"impactScore\":4.9,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-310\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:cxf:2.5.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D24246B2-915D-494B-9863-CF0B662BE54D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:cxf:2.5.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6915B2EC-AA31-44B5-A5F3-3EE1FDD0ABC7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:cxf:2.5.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"90280778-F7D6-49E2-9C7F-9F5F58137FDE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:cxf:2.5.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"962F2A85-4731-450B-986B-E1A79986F143\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:cxf:2.5.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"49F920D4-1102-4D30-ABD8-F47342DA735A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:cxf:2.5.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"84FD5387-E292-458A-9E8C-85C082461594\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:cxf:2.5.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9D523A5E-24A7-43D7-AE54-02EBF13537D2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:cxf:2.5.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FC774B3E-D7E4-4FC1-AB09-392EC16F0F76\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:cxf:2.5.8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5A1ECB5D-F146-4E4A-BB9A-C96EB5C863A4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:cxf:2.5.9:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1138E4D2-7CB6-42C0-91A8-D6C2BDC9F764\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:cxf:2.6.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A4FC7D67-80A3-43F6-8D46-F13F37A017CF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:cxf:2.6.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4F069B04-FDA0-41C3-BCAC-C74A310078B7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:cxf:2.6.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EED986C6-39C6-4F2A-86F7-C2CE9BBE25B4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:cxf:2.6.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EE5CF2CB-B33D-4C51-84C3-8C10E3E26193\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:cxf:2.6.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7BACD3A8-2FEE-4CB7-9229-06679D6D8150\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:cxf:2.6.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0835933D-4EA4-4C95-8964-984087537268\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:cxf:2.6.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"070739FD-9411-4BDB-A96F-3BC4A676A40F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:cxf:2.7.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C629A8A7-BFB3-453B-9BCA-3873512410FA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:cxf:2.7.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"346AF04F-E0C5-45EE-A421-2E1A4E2B57FB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:cxf:2.7.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"29777E8F-4DB3-4E9E-9FF4-D13749A7C0AE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:cxf:2.7.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EA20A9DA-2BEB-4699-A8D4-A90EA036693F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:redhat:jboss_enterprise_application_platform:5.0.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F5D7F1AD-4BD3-4C37-B6B5-B287464B2EEB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:redhat:jboss_enterprise_portal_platform:4.3.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AC50B7E2-35A0-4D2B-8865-69EF15C7B31E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:redhat:jboss_enterprise_soa_platform:4.3.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C57B8004-AF15-4F0F-B9FA-A3CFF7BD42DE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:redhat:jboss_enterprise_web_platform:5.2.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"38F66D5B-F906-437E-977E-F9F930648886\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:redhat:jboss_fuse_esb_enterprise:7.1.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"658C466F-5DCB-4393-84A9-4B7A93F69724\"}]}]}],\"references\":[{\"url\":\"http://cxf.apache.org/cve-2012-5575.html\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://rhn.redhat.com/errata/RHSA-2013-0833.html\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://rhn.redhat.com/errata/RHSA-2013-0834.html\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://rhn.redhat.com/errata/RHSA-2013-0839.html\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://rhn.redhat.com/errata/RHSA-2013-0873.html\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://rhn.redhat.com/errata/RHSA-2013-0874.html\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://rhn.redhat.com/errata/RHSA-2013-0875.html\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://rhn.redhat.com/errata/RHSA-2013-0876.html\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://rhn.redhat.com/errata/RHSA-2013-0943.html\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://rhn.redhat.com/errata/RHSA-2013-1028.html\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://rhn.redhat.com/errata/RHSA-2013-1143.html\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://rhn.redhat.com/errata/RHSA-2013-1437.html\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.nds.ruhr-uni-bochum.de/research/publications/backwards-compatibility/\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.securityfocus.com/bid/60043\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://bugzilla.redhat.com/show_bug.cgi?id=880443\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://lists.apache.org/thread.html/r36e44ffc1a9b365327df62cdfaabe85b9a5637de102cea07d79b2dbf%40%3Ccommits.cxf.apache.org%3E\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://lists.apache.org/thread.html/rc774278135816e7afc943dc9fc78eb0764f2c84a2b96470a0187315c%40%3Ccommits.cxf.apache.org%3E\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://lists.apache.org/thread.html/rd49aabd984ed540c8ff7916d4d79405f3fa311d2fdbcf9ed307839a6%40%3Ccommits.cxf.apache.org%3E\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://lists.apache.org/thread.html/rec7160382badd3ef4ad017a22f64a266c7188b9ba71394f0d321e2d4%40%3Ccommits.cxf.apache.org%3E\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://lists.apache.org/thread.html/rfb87e0bf3995e7d560afeed750fac9329ff5f1ad49da365129b7f89e%40%3Ccommits.cxf.apache.org%3E\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://lists.apache.org/thread.html/rff42cfa5e7d75b7c1af0e37589140a8f1999e578a75738740b244bd4%40%3Ccommits.cxf.apache.org%3E\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://cxf.apache.org/cve-2012-5575.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://rhn.redhat.com/errata/RHSA-2013-0833.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://rhn.redhat.com/errata/RHSA-2013-0834.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://rhn.redhat.com/errata/RHSA-2013-0839.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://rhn.redhat.com/errata/RHSA-2013-0873.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://rhn.redhat.com/errata/RHSA-2013-0874.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://rhn.redhat.com/errata/RHSA-2013-0875.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://rhn.redhat.com/errata/RHSA-2013-0876.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://rhn.redhat.com/errata/RHSA-2013-0943.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://rhn.redhat.com/errata/RHSA-2013-1028.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://rhn.redhat.com/errata/RHSA-2013-1143.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://rhn.redhat.com/errata/RHSA-2013-1437.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.nds.ruhr-uni-bochum.de/research/publications/backwards-compatibility/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.securityfocus.com/bid/60043\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://bugzilla.redhat.com/show_bug.cgi?id=880443\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://lists.apache.org/thread.html/r36e44ffc1a9b365327df62cdfaabe85b9a5637de102cea07d79b2dbf%40%3Ccommits.cxf.apache.org%3E\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://lists.apache.org/thread.html/rc774278135816e7afc943dc9fc78eb0764f2c84a2b96470a0187315c%40%3Ccommits.cxf.apache.org%3E\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://lists.apache.org/thread.html/rd49aabd984ed540c8ff7916d4d79405f3fa311d2fdbcf9ed307839a6%40%3Ccommits.cxf.apache.org%3E\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://lists.apache.org/thread.html/rec7160382badd3ef4ad017a22f64a266c7188b9ba71394f0d321e2d4%40%3Ccommits.cxf.apache.org%3E\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://lists.apache.org/thread.html/rfb87e0bf3995e7d560afeed750fac9329ff5f1ad49da365129b7f89e%40%3Ccommits.cxf.apache.org%3E\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://lists.apache.org/thread.html/rff42cfa5e7d75b7c1af0e37589140a8f1999e578a75738740b244bd4%40%3Ccommits.cxf.apache.org%3E\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"}]}}"
  }
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or observed by the user.
  • Confirmed: The vulnerability has been validated from an analyst's perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
  • Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
  • Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
  • Not confirmed: The user expressed doubt about the validity of the vulnerability.
  • Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.


Loading…

Detection rules are retrieved from Rulezet.

Loading…

Loading…