Action not permitted
Modal body text goes here.
Modal Title
Modal Body
ghsa-8hfm-837h-hjg5
Vulnerability from github
The design of the W3C XML Signature Syntax and Processing (XMLDsig) recommendation, as implemented in multiple products.
The Apache XML Security (Java) is affected by the vulnerability published in US-Cert VU #466161. See: http://www.kb.cert.org/vuls/id/466161 for more information. This bug can allow an attacker to bypass authentication by inserting/modifying a small HMAC truncation length parameter in the XML Signature HMAC based SignatureMethod algorithms.
An inexhaustive list of additional affected products includes:
1. the Oracle Security Developer Tools component in Oracle Application Server 10.1.2.3, 10.1.3.4, and 10.1.4.3IM;
2. the WebLogic Server component in BEA Product Suite 10.3, 10.0 MP1, 9.2 MP3, 9.1, 9.0, and 8.1 SP6;
3. Mono before 2.4.2.2;
4. XML Security Library before 1.2.12;
5. IBM WebSphere Application Server Versions 6.0 through 6.0.2.33, 6.1 through 6.1.0.23, and 7.0 through 7.0.0.1;
6. Sun JDK and JRE Update 14 and earlier;
7. Microsoft .NET Framework 3.0 through 3.0 SP2, 3.5, and 4.0; and other products uses a parameter that defines an HMAC truncation length (HMACOutputLength) but does not require a minimum for this length, which allows attackers to spoof HMAC-based signatures and bypass authentication by specifying a truncation length with a small number of bits.
{ affected: [ { package: { ecosystem: "Maven", name: "org.apache.santuario:xmlsec", }, ranges: [ { events: [ { introduced: "1.4.0", }, { fixed: "1.4.3", }, ], type: "ECOSYSTEM", }, ], }, ], aliases: [ "CVE-2009-0217", ], database_specific: { cwe_ids: [], github_reviewed: true, github_reviewed_at: "2022-11-08T14:55:27Z", nvd_published_at: "2009-07-14T23:30:00Z", severity: "MODERATE", }, details: "The design of the W3C XML Signature Syntax and Processing (XMLDsig) recommendation, as implemented in multiple products.\n\nThe Apache XML Security (Java) is affected by the vulnerability published in US-Cert VU #466161. See: http://www.kb.cert.org/vuls/id/466161 for more information. This bug can allow an attacker to bypass authentication by inserting/modifying a small HMAC truncation length parameter in the XML Signature HMAC based SignatureMethod algorithms.\n\nAn inexhaustive list of additional affected products includes: \n1. the Oracle Security Developer Tools component in Oracle Application Server 10.1.2.3, 10.1.3.4, and 10.1.4.3IM; \n2. the WebLogic Server component in BEA Product Suite 10.3, 10.0 MP1, 9.2 MP3, 9.1, 9.0, and 8.1 SP6; \n3. Mono before 2.4.2.2; \n4. XML Security Library before 1.2.12; \n5. IBM WebSphere Application Server Versions 6.0 through 6.0.2.33, 6.1 through 6.1.0.23, and 7.0 through 7.0.0.1; \n6. Sun JDK and JRE Update 14 and earlier; \n7. Microsoft .NET Framework 3.0 through 3.0 SP2, 3.5, and 4.0; and other products uses a parameter that defines an HMAC truncation length (HMACOutputLength) but does not require a minimum for this length, which allows attackers to spoof HMAC-based signatures and bypass authentication by specifying a truncation length with a small number of bits.", id: "GHSA-8hfm-837h-hjg5", modified: "2022-11-08T14:55:27Z", published: "2022-05-02T03:13:38Z", references: [ { type: "ADVISORY", url: "https://nvd.nist.gov/vuln/detail/CVE-2009-0217", }, { type: "WEB", url: "https://www.w3.org/QA/2009/07/hmac_truncation_in_xml_signatu.html", }, { type: "WEB", url: "https://www.w3.org/2008/06/xmldsigcore-errata.html#e03", }, { type: "WEB", url: "https://www.us-cert.gov/cas/techalerts/TA09-294A.html", }, { type: "WEB", url: "https://www.ubuntu.com/usn/USN-903-1", }, { type: "WEB", url: "https://www.redhat.com/support/errata/RHSA-2009-1694.html", }, { type: "WEB", url: "https://www.redhat.com/archives/fedora-package-announce/2009-August/msg00505.html", }, { type: "WEB", url: "https://www.redhat.com/archives/fedora-package-announce/2009-August/msg00494.html", }, { type: "WEB", url: "https://www.redhat.com/archives/fedora-package-announce/2009-August/msg00325.html", }, { type: "WEB", url: "https://www.redhat.com/archives/fedora-package-announce/2009-August/msg00310.html", }, { type: "WEB", url: "https://www.mandriva.com/security/advisories?name=MDVSA-2009:209", }, { type: "WEB", url: "https://www.kb.cert.org/vuls/id/WDON-7TY529", }, { type: "WEB", url: "https://www.kb.cert.org/vuls/id/MAPG-7TSKXQ", }, { type: "WEB", url: "https://www.kb.cert.org/vuls/id/466161", }, { type: "WEB", url: "https://www.gentoo.org/security/en/glsa/glsa-201408-19.xml", }, { type: "WEB", url: "https://www.debian.org/security/2010/dsa-1995", }, { type: "WEB", url: "https://svn.apache.org/viewvc?revision=794013&view=revision", }, { type: "WEB", url: "https://rhn.redhat.com/errata/RHSA-2009-1428.html", }, { type: "WEB", url: "https://marc.info/?l=bugtraq&m=125787273209737&w=2", }, { type: "WEB", url: "https://lists.opensuse.org/opensuse-security-announce/2010-03/msg00005.html", }, { type: "WEB", url: "https://lists.opensuse.org/opensuse-security-announce/2009-11/msg00002.html", }, { type: "WEB", url: "https://lists.apple.com/archives/security-announce/2009/Sep/msg00000.html", }, { type: "WEB", url: "https://issues.apache.org/bugzilla/show_bug.cgi?id=47527", }, { type: "WEB", url: "https://issues.apache.org/bugzilla/show_bug.cgi?id=47526", }, { type: "WEB", url: "https://gitlab.gnome.org/Archive/xmlsec/-/commit/34b349675af9f72eb822837a8772cc1ead7115c7", }, { type: "WEB", url: "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2010/ms10-041", }, { type: "WEB", url: "https://bugzilla.redhat.com/show_bug.cgi?id=511915", }, { type: "WEB", url: "http://www.us-cert.gov/cas/techalerts/TA10-159B.html", }, ], schema_version: "1.4.0", severity: [], summary: "Apache XML Security For Java vulnerable to authentication bypass by HMAC truncation", }
cve-2009-0217
Vulnerability from cvelistv5
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-07T04:24:18.400Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { name: "RHSA-2009:1428", tags: [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred", ], url: "https://rhn.redhat.com/errata/RHSA-2009-1428.html", }, { name: "ADV-2009-3122", tags: [ "vdb-entry", "x_refsource_VUPEN", "x_transferred", ], url: "http://www.vupen.com/english/advisories/2009/3122", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www.openoffice.org/security/cves/CVE-2009-0217.html", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://issues.apache.org/bugzilla/show_bug.cgi?id=47526", }, { name: "60799", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/60799", }, { name: "GLSA-201408-19", tags: [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred", ], url: "http://www.gentoo.org/security/en/glsa/glsa-201408-19.xml", }, { name: "PK80596", tags: [ "vendor-advisory", "x_refsource_AIXAPAR", "x_transferred", ], url: "http://www-01.ibm.com/support/docview.wss?rs=180&context=SSEQTP&dc=D400&uid=swg24023545&loc=en_US&cs=UTF-8&lang=en&rss=ct180websphere", }, { name: "RHSA-2009:1200", tags: [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred", ], url: "https://rhn.redhat.com/errata/RHSA-2009-1200.html", }, { name: "35776", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/35776", }, { name: "36162", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/36162", }, { name: "36494", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/36494", }, { name: "ADV-2009-2543", tags: [ "vdb-entry", "x_refsource_VUPEN", "x_transferred", ], url: "http://www.vupen.com/english/advisories/2009/2543", }, { name: "35858", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/35858", }, { name: "38695", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/38695", }, { name: "269208", tags: [ "vendor-advisory", "x_refsource_SUNALERT", "x_transferred", ], url: "http://sunsolve.sun.com/search/document.do?assetkey=1-66-269208-1", }, { name: "DSA-1995", tags: [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred", ], url: "http://www.debian.org/security/2010/dsa-1995", }, { name: "HPSBUX02476", tags: [ "vendor-advisory", "x_refsource_HP", "x_transferred", ], url: "http://marc.info/?l=bugtraq&m=125787273209737&w=2", }, { name: "35853", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/35853", }, { name: "RHSA-2009:1637", tags: [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred", ], url: "https://rhn.redhat.com/errata/RHSA-2009-1637.html", }, { name: "RHSA-2009:1694", tags: [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred", ], url: "http://www.redhat.com/support/errata/RHSA-2009-1694.html", }, { name: "35852", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/35852", }, { name: "35854", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/35854", }, { name: "34461", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/34461", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www.kb.cert.org/vuls/id/WDON-7TY529", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www.mono-project.com/Vulnerabilities", }, { name: "1020710", tags: [ "vendor-advisory", "x_refsource_SUNALERT", "x_transferred", ], url: "http://sunsolve.sun.com/search/document.do?assetkey=1-77-1020710.1-1", }, { name: "USN-903-1", tags: [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred", ], url: "http://www.ubuntu.com/usn/USN-903-1", }, { name: "35671", tags: [ "vdb-entry", "x_refsource_BID", "x_transferred", ], url: "http://www.securityfocus.com/bid/35671", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://issues.apache.org/bugzilla/show_bug.cgi?id=47527", }, { name: "ADV-2010-0366", tags: [ "vdb-entry", "x_refsource_VUPEN", "x_transferred", ], url: "http://www.vupen.com/english/advisories/2010/0366", }, { name: "55907", tags: [ "vdb-entry", "x_refsource_OSVDB", "x_transferred", ], url: "http://osvdb.org/55907", }, { name: "MDVSA-2009:209", tags: [ "vendor-advisory", "x_refsource_MANDRIVA", "x_transferred", ], url: "http://www.mandriva.com/security/advisories?name=MDVSA-2009:209", }, { name: "SUSE-SA:2010:017", tags: [ "vendor-advisory", "x_refsource_SUSE", "x_transferred", ], url: "http://lists.opensuse.org/opensuse-security-announce/2010-03/msg00005.html", }, { name: "38567", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/38567", }, { name: "FEDORA-2009-8329", tags: [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred", ], url: "https://www.redhat.com/archives/fedora-package-announce/2009-August/msg00310.html", }, { name: "263429", tags: [ "vendor-advisory", "x_refsource_SUNALERT", "x_transferred", ], url: "http://sunsolve.sun.com/search/document.do?assetkey=1-66-263429-1", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://blogs.sun.com/security/entry/cert_vulnerability_note_vu_466161", }, { name: "SSRT090250", tags: [ "vendor-advisory", "x_refsource_HP", "x_transferred", ], url: "http://marc.info/?l=bugtraq&m=125787273209737&w=2", }, { name: "ADV-2009-1900", tags: [ "vdb-entry", "x_refsource_VUPEN", "x_transferred", ], url: "http://www.vupen.com/english/advisories/2009/1900", }, { name: "1022561", tags: [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred", ], url: "http://www.securitytracker.com/id?1022561", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www.oracle.com/technetwork/topics/security/cpuoct2010-175626.html", }, { name: "37671", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/37671", }, { name: "VU#466161", tags: [ "third-party-advisory", "x_refsource_CERT-VN", "x_transferred", ], url: "http://www.kb.cert.org/vuls/id/466161", }, { name: "1022567", tags: [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred", ], url: "http://www.securitytracker.com/id?1022567", }, { name: "RHSA-2009:1636", tags: [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred", ], url: "https://rhn.redhat.com/errata/RHSA-2009-1636.html", }, { name: "PK80627", tags: [ "vendor-advisory", "x_refsource_AIXAPAR", "x_transferred", ], url: "http://www-01.ibm.com/support/docview.wss?rs=180&context=SSEQTP&dc=D400&uid=swg24023723&loc=en_US&cs=UTF-8&lang=en&rss=ct180websphere", }, { name: "RHSA-2009:1649", tags: [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred", ], url: "https://rhn.redhat.com/errata/RHSA-2009-1649.html", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www.oracle.com/technetwork/topics/security/cpujul2009-091332.html", }, { name: "TA09-294A", tags: [ "third-party-advisory", "x_refsource_CERT", "x_transferred", ], url: "http://www.us-cert.gov/cas/techalerts/TA09-294A.html", }, { name: "ADV-2009-1909", tags: [ "vdb-entry", "x_refsource_VUPEN", "x_transferred", ], url: "http://www.vupen.com/english/advisories/2009/1909", }, { name: "ADV-2010-0635", tags: [ "vdb-entry", "x_refsource_VUPEN", "x_transferred", ], url: "http://www.vupen.com/english/advisories/2010/0635", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://svn.apache.org/viewvc?revision=794013&view=revision", }, { name: "38568", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/38568", }, { name: "36180", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/36180", }, { name: "FEDORA-2009-8456", tags: [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred", ], url: "https://www.redhat.com/archives/fedora-package-announce/2009-August/msg00494.html", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www.w3.org/2008/06/xmldsigcore-errata.html#e03", }, { name: "USN-826-1", tags: [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred", ], url: "https://usn.ubuntu.com/826-1/", }, { name: "37841", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/37841", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www.oracle.com/technetwork/topics/security/cpuoct2009-096303.html", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://sunsolve.sun.com/search/document.do?assetkey=1-21-125136-16-1", }, { name: "35855", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/35855", }, { name: "FEDORA-2009-8473", tags: [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred", ], url: "https://www.redhat.com/archives/fedora-package-announce/2009-August/msg00505.html", }, { name: "36176", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/36176", }, { name: "oval:org.mitre.oval:def:7158", tags: [ "vdb-entry", "signature", "x_refsource_OVAL", "x_transferred", ], url: "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7158", }, { tags: [ "x_refsource_MISC", "x_transferred", ], url: "http://www.w3.org/QA/2009/07/hmac_truncation_in_xml_signatu.html", }, { name: "ADV-2009-1908", tags: [ "vdb-entry", "x_refsource_VUPEN", "x_transferred", ], url: "http://www.vupen.com/english/advisories/2009/1908", }, { name: "FEDORA-2009-8337", tags: [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred", ], url: "https://www.redhat.com/archives/fedora-package-announce/2009-August/msg00325.html", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://git.gnome.org/cgit/xmlsec/commit/?id=34b349675af9f72eb822837a8772cc1ead7115c7", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www-01.ibm.com/support/docview.wss?rs=180&uid=swg21384925", }, { name: "41818", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/41818", }, { name: "1022661", tags: [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred", ], url: "http://www.securitytracker.com/id?1022661", }, { name: "37300", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/37300", }, { name: "ADV-2009-1911", tags: [ "vdb-entry", "x_refsource_VUPEN", "x_transferred", ], url: "http://www.vupen.com/english/advisories/2009/1911", }, { name: "APPLE-SA-2009-09-03-1", tags: [ "vendor-advisory", "x_refsource_APPLE", "x_transferred", ], url: "http://lists.apple.com/archives/security-announce/2009/Sep/msg00000.html", }, { name: "SUSE-SA:2009:053", tags: [ "vendor-advisory", "x_refsource_SUSE", "x_transferred", ], url: "http://lists.opensuse.org/opensuse-security-announce/2009-11/msg00002.html", }, { name: "oval:org.mitre.oval:def:8717", tags: [ "vdb-entry", "signature", "x_refsource_OVAL", "x_transferred", ], url: "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A8717", }, { name: "RHSA-2009:1201", tags: [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred", ], url: "https://rhn.redhat.com/errata/RHSA-2009-1201.html", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://git.gnome.org/cgit/xmlsec/patch/?id=34b349675af9f72eb822837a8772cc1ead7115c7", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www.kb.cert.org/vuls/id/MAPG-7TSKXQ", }, { name: "TA10-159B", tags: [ "third-party-advisory", "x_refsource_CERT", "x_transferred", ], url: "http://www.us-cert.gov/cas/techalerts/TA10-159B.html", }, { name: "oval:org.mitre.oval:def:10186", tags: [ "vdb-entry", "signature", "x_refsource_OVAL", "x_transferred", ], url: "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10186", }, { name: "55895", tags: [ "vdb-entry", "x_refsource_OSVDB", "x_transferred", ], url: "http://osvdb.org/55895", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www.aleksey.com/xmlsec/", }, { name: "MS10-041", tags: [ "vendor-advisory", "x_refsource_MS", "x_transferred", ], url: "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2010/ms10-041", }, { name: "38921", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/38921", }, { name: "RHSA-2009:1650", tags: [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred", ], url: "https://rhn.redhat.com/errata/RHSA-2009-1650.html", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://bugzilla.redhat.com/show_bug.cgi?id=511915", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "n/a", vendor: "n/a", versions: [ { status: "affected", version: "n/a", }, ], }, ], datePublic: "2009-07-14T00:00:00", descriptions: [ { lang: "en", value: "The design of the W3C XML Signature Syntax and Processing (XMLDsig) recommendation, as implemented in products including (1) the Oracle Security Developer Tools component in Oracle Application Server 10.1.2.3, 10.1.3.4, and 10.1.4.3IM; (2) the WebLogic Server component in BEA Product Suite 10.3, 10.0 MP1, 9.2 MP3, 9.1, 9.0, and 8.1 SP6; (3) Mono before 2.4.2.2; (4) XML Security Library before 1.2.12; (5) IBM WebSphere Application Server Versions 6.0 through 6.0.2.33, 6.1 through 6.1.0.23, and 7.0 through 7.0.0.1; (6) Sun JDK and JRE Update 14 and earlier; (7) Microsoft .NET Framework 3.0 through 3.0 SP2, 3.5, and 4.0; and other products uses a parameter that defines an HMAC truncation length (HMACOutputLength) but does not require a minimum for this length, which allows attackers to spoof HMAC-based signatures and bypass authentication by specifying a truncation length with a small number of bits.", }, ], problemTypes: [ { descriptions: [ { description: "n/a", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2018-10-12T19:57:01", orgId: "37e5125f-f79b-445b-8fad-9564f167944b", shortName: "certcc", }, references: [ { name: "RHSA-2009:1428", tags: [ "vendor-advisory", "x_refsource_REDHAT", ], url: "https://rhn.redhat.com/errata/RHSA-2009-1428.html", }, { name: "ADV-2009-3122", tags: [ "vdb-entry", "x_refsource_VUPEN", ], url: "http://www.vupen.com/english/advisories/2009/3122", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www.openoffice.org/security/cves/CVE-2009-0217.html", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://issues.apache.org/bugzilla/show_bug.cgi?id=47526", }, { name: "60799", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/60799", }, { name: "GLSA-201408-19", tags: [ "vendor-advisory", "x_refsource_GENTOO", ], url: "http://www.gentoo.org/security/en/glsa/glsa-201408-19.xml", }, { name: "PK80596", tags: [ "vendor-advisory", "x_refsource_AIXAPAR", ], url: "http://www-01.ibm.com/support/docview.wss?rs=180&context=SSEQTP&dc=D400&uid=swg24023545&loc=en_US&cs=UTF-8&lang=en&rss=ct180websphere", }, { name: "RHSA-2009:1200", tags: [ "vendor-advisory", "x_refsource_REDHAT", ], url: "https://rhn.redhat.com/errata/RHSA-2009-1200.html", }, { name: "35776", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/35776", }, { name: "36162", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/36162", }, { name: "36494", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/36494", }, { name: "ADV-2009-2543", tags: [ "vdb-entry", "x_refsource_VUPEN", ], url: "http://www.vupen.com/english/advisories/2009/2543", }, { name: "35858", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/35858", }, { name: "38695", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/38695", }, { name: "269208", tags: [ "vendor-advisory", "x_refsource_SUNALERT", ], url: "http://sunsolve.sun.com/search/document.do?assetkey=1-66-269208-1", }, { name: "DSA-1995", tags: [ "vendor-advisory", "x_refsource_DEBIAN", ], url: "http://www.debian.org/security/2010/dsa-1995", }, { name: "HPSBUX02476", tags: [ "vendor-advisory", "x_refsource_HP", ], url: "http://marc.info/?l=bugtraq&m=125787273209737&w=2", }, { name: "35853", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/35853", }, { name: "RHSA-2009:1637", tags: [ "vendor-advisory", "x_refsource_REDHAT", ], url: "https://rhn.redhat.com/errata/RHSA-2009-1637.html", }, { name: "RHSA-2009:1694", tags: [ "vendor-advisory", "x_refsource_REDHAT", ], url: "http://www.redhat.com/support/errata/RHSA-2009-1694.html", }, { name: "35852", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/35852", }, { name: "35854", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/35854", }, { name: "34461", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/34461", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www.kb.cert.org/vuls/id/WDON-7TY529", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www.mono-project.com/Vulnerabilities", }, { name: "1020710", tags: [ "vendor-advisory", "x_refsource_SUNALERT", ], url: "http://sunsolve.sun.com/search/document.do?assetkey=1-77-1020710.1-1", }, { name: "USN-903-1", tags: [ "vendor-advisory", "x_refsource_UBUNTU", ], url: "http://www.ubuntu.com/usn/USN-903-1", }, { name: "35671", tags: [ "vdb-entry", "x_refsource_BID", ], url: "http://www.securityfocus.com/bid/35671", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://issues.apache.org/bugzilla/show_bug.cgi?id=47527", }, { name: "ADV-2010-0366", tags: [ "vdb-entry", "x_refsource_VUPEN", ], url: "http://www.vupen.com/english/advisories/2010/0366", }, { name: "55907", tags: [ "vdb-entry", "x_refsource_OSVDB", ], url: "http://osvdb.org/55907", }, { name: "MDVSA-2009:209", tags: [ "vendor-advisory", "x_refsource_MANDRIVA", ], url: "http://www.mandriva.com/security/advisories?name=MDVSA-2009:209", }, { name: "SUSE-SA:2010:017", tags: [ "vendor-advisory", "x_refsource_SUSE", ], url: "http://lists.opensuse.org/opensuse-security-announce/2010-03/msg00005.html", }, { name: "38567", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/38567", }, { name: "FEDORA-2009-8329", tags: [ "vendor-advisory", "x_refsource_FEDORA", ], url: "https://www.redhat.com/archives/fedora-package-announce/2009-August/msg00310.html", }, { name: "263429", tags: [ "vendor-advisory", "x_refsource_SUNALERT", ], url: "http://sunsolve.sun.com/search/document.do?assetkey=1-66-263429-1", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://blogs.sun.com/security/entry/cert_vulnerability_note_vu_466161", }, { name: "SSRT090250", tags: [ "vendor-advisory", "x_refsource_HP", ], url: "http://marc.info/?l=bugtraq&m=125787273209737&w=2", }, { name: "ADV-2009-1900", tags: [ "vdb-entry", "x_refsource_VUPEN", ], url: "http://www.vupen.com/english/advisories/2009/1900", }, { name: "1022561", tags: [ "vdb-entry", "x_refsource_SECTRACK", ], url: "http://www.securitytracker.com/id?1022561", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www.oracle.com/technetwork/topics/security/cpuoct2010-175626.html", }, { name: "37671", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/37671", }, { name: "VU#466161", tags: [ "third-party-advisory", "x_refsource_CERT-VN", ], url: "http://www.kb.cert.org/vuls/id/466161", }, { name: "1022567", tags: [ "vdb-entry", "x_refsource_SECTRACK", ], url: "http://www.securitytracker.com/id?1022567", }, { name: "RHSA-2009:1636", tags: [ "vendor-advisory", "x_refsource_REDHAT", ], url: "https://rhn.redhat.com/errata/RHSA-2009-1636.html", }, { name: "PK80627", tags: [ "vendor-advisory", "x_refsource_AIXAPAR", ], url: "http://www-01.ibm.com/support/docview.wss?rs=180&context=SSEQTP&dc=D400&uid=swg24023723&loc=en_US&cs=UTF-8&lang=en&rss=ct180websphere", }, { name: "RHSA-2009:1649", tags: [ "vendor-advisory", "x_refsource_REDHAT", ], url: "https://rhn.redhat.com/errata/RHSA-2009-1649.html", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www.oracle.com/technetwork/topics/security/cpujul2009-091332.html", }, { name: "TA09-294A", tags: [ "third-party-advisory", "x_refsource_CERT", ], url: "http://www.us-cert.gov/cas/techalerts/TA09-294A.html", }, { name: "ADV-2009-1909", tags: [ "vdb-entry", "x_refsource_VUPEN", ], url: "http://www.vupen.com/english/advisories/2009/1909", }, { name: "ADV-2010-0635", tags: [ "vdb-entry", "x_refsource_VUPEN", ], url: "http://www.vupen.com/english/advisories/2010/0635", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://svn.apache.org/viewvc?revision=794013&view=revision", }, { name: "38568", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/38568", }, { name: "36180", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/36180", }, { name: "FEDORA-2009-8456", tags: [ "vendor-advisory", "x_refsource_FEDORA", ], url: "https://www.redhat.com/archives/fedora-package-announce/2009-August/msg00494.html", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www.w3.org/2008/06/xmldsigcore-errata.html#e03", }, { name: "USN-826-1", tags: [ "vendor-advisory", "x_refsource_UBUNTU", ], url: "https://usn.ubuntu.com/826-1/", }, { name: "37841", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/37841", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www.oracle.com/technetwork/topics/security/cpuoct2009-096303.html", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://sunsolve.sun.com/search/document.do?assetkey=1-21-125136-16-1", }, { name: "35855", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/35855", }, { name: "FEDORA-2009-8473", tags: [ "vendor-advisory", "x_refsource_FEDORA", ], url: "https://www.redhat.com/archives/fedora-package-announce/2009-August/msg00505.html", }, { name: "36176", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/36176", }, { name: "oval:org.mitre.oval:def:7158", tags: [ "vdb-entry", "signature", "x_refsource_OVAL", ], url: "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7158", }, { tags: [ "x_refsource_MISC", ], url: "http://www.w3.org/QA/2009/07/hmac_truncation_in_xml_signatu.html", }, { name: "ADV-2009-1908", tags: [ "vdb-entry", "x_refsource_VUPEN", ], url: "http://www.vupen.com/english/advisories/2009/1908", }, { name: "FEDORA-2009-8337", tags: [ "vendor-advisory", "x_refsource_FEDORA", ], url: "https://www.redhat.com/archives/fedora-package-announce/2009-August/msg00325.html", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://git.gnome.org/cgit/xmlsec/commit/?id=34b349675af9f72eb822837a8772cc1ead7115c7", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www-01.ibm.com/support/docview.wss?rs=180&uid=swg21384925", }, { name: "41818", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/41818", }, { name: "1022661", tags: [ "vdb-entry", "x_refsource_SECTRACK", ], url: "http://www.securitytracker.com/id?1022661", }, { name: "37300", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/37300", }, { name: "ADV-2009-1911", tags: [ "vdb-entry", "x_refsource_VUPEN", ], url: "http://www.vupen.com/english/advisories/2009/1911", }, { name: "APPLE-SA-2009-09-03-1", tags: [ "vendor-advisory", "x_refsource_APPLE", ], url: "http://lists.apple.com/archives/security-announce/2009/Sep/msg00000.html", }, { name: "SUSE-SA:2009:053", tags: [ "vendor-advisory", "x_refsource_SUSE", ], url: "http://lists.opensuse.org/opensuse-security-announce/2009-11/msg00002.html", }, { name: "oval:org.mitre.oval:def:8717", tags: [ "vdb-entry", "signature", "x_refsource_OVAL", ], url: "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A8717", }, { name: "RHSA-2009:1201", tags: [ "vendor-advisory", "x_refsource_REDHAT", ], url: "https://rhn.redhat.com/errata/RHSA-2009-1201.html", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://git.gnome.org/cgit/xmlsec/patch/?id=34b349675af9f72eb822837a8772cc1ead7115c7", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www.kb.cert.org/vuls/id/MAPG-7TSKXQ", }, { name: "TA10-159B", tags: [ "third-party-advisory", "x_refsource_CERT", ], url: "http://www.us-cert.gov/cas/techalerts/TA10-159B.html", }, { name: "oval:org.mitre.oval:def:10186", tags: [ "vdb-entry", "signature", "x_refsource_OVAL", ], url: "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10186", }, { name: "55895", tags: [ "vdb-entry", "x_refsource_OSVDB", ], url: "http://osvdb.org/55895", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www.aleksey.com/xmlsec/", }, { name: "MS10-041", tags: [ "vendor-advisory", "x_refsource_MS", ], url: "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2010/ms10-041", }, { name: "38921", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/38921", }, { name: "RHSA-2009:1650", tags: [ "vendor-advisory", "x_refsource_REDHAT", ], url: "https://rhn.redhat.com/errata/RHSA-2009-1650.html", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://bugzilla.redhat.com/show_bug.cgi?id=511915", }, ], x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "cert@cert.org", ID: "CVE-2009-0217", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "n/a", version: { version_data: [ { version_value: "n/a", }, ], }, }, ], }, vendor_name: "n/a", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "The design of the W3C XML Signature Syntax and Processing (XMLDsig) recommendation, as implemented in products including (1) the Oracle Security Developer Tools component in Oracle Application Server 10.1.2.3, 10.1.3.4, and 10.1.4.3IM; (2) the WebLogic Server component in BEA Product Suite 10.3, 10.0 MP1, 9.2 MP3, 9.1, 9.0, and 8.1 SP6; (3) Mono before 2.4.2.2; (4) XML Security Library before 1.2.12; (5) IBM WebSphere Application Server Versions 6.0 through 6.0.2.33, 6.1 through 6.1.0.23, and 7.0 through 7.0.0.1; (6) Sun JDK and JRE Update 14 and earlier; (7) Microsoft .NET Framework 3.0 through 3.0 SP2, 3.5, and 4.0; and other products uses a parameter that defines an HMAC truncation length (HMACOutputLength) but does not require a minimum for this length, which allows attackers to spoof HMAC-based signatures and bypass authentication by specifying a truncation length with a small number of bits.", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "n/a", }, ], }, ], }, references: { reference_data: [ { name: "RHSA-2009:1428", refsource: "REDHAT", url: "https://rhn.redhat.com/errata/RHSA-2009-1428.html", }, { name: "ADV-2009-3122", refsource: "VUPEN", url: "http://www.vupen.com/english/advisories/2009/3122", }, { name: "http://www.openoffice.org/security/cves/CVE-2009-0217.html", refsource: "CONFIRM", url: "http://www.openoffice.org/security/cves/CVE-2009-0217.html", }, { name: "https://issues.apache.org/bugzilla/show_bug.cgi?id=47526", refsource: "CONFIRM", url: "https://issues.apache.org/bugzilla/show_bug.cgi?id=47526", }, { name: "60799", refsource: "SECUNIA", url: "http://secunia.com/advisories/60799", }, { name: "GLSA-201408-19", refsource: "GENTOO", url: "http://www.gentoo.org/security/en/glsa/glsa-201408-19.xml", }, { name: "PK80596", refsource: "AIXAPAR", url: "http://www-01.ibm.com/support/docview.wss?rs=180&context=SSEQTP&dc=D400&uid=swg24023545&loc=en_US&cs=UTF-8&lang=en&rss=ct180websphere", }, { name: "RHSA-2009:1200", refsource: "REDHAT", url: "https://rhn.redhat.com/errata/RHSA-2009-1200.html", }, { name: "35776", refsource: "SECUNIA", url: "http://secunia.com/advisories/35776", }, { name: "36162", refsource: "SECUNIA", url: "http://secunia.com/advisories/36162", }, { name: "36494", refsource: "SECUNIA", url: "http://secunia.com/advisories/36494", }, { name: "ADV-2009-2543", refsource: "VUPEN", url: "http://www.vupen.com/english/advisories/2009/2543", }, { name: "35858", refsource: "SECUNIA", url: "http://secunia.com/advisories/35858", }, { name: "38695", refsource: "SECUNIA", url: "http://secunia.com/advisories/38695", }, { name: "269208", refsource: "SUNALERT", url: "http://sunsolve.sun.com/search/document.do?assetkey=1-66-269208-1", }, { name: "DSA-1995", refsource: "DEBIAN", url: "http://www.debian.org/security/2010/dsa-1995", }, { name: "HPSBUX02476", refsource: "HP", url: "http://marc.info/?l=bugtraq&m=125787273209737&w=2", }, { name: "35853", refsource: "SECUNIA", url: "http://secunia.com/advisories/35853", }, { name: "RHSA-2009:1637", refsource: "REDHAT", url: "https://rhn.redhat.com/errata/RHSA-2009-1637.html", }, { name: "RHSA-2009:1694", refsource: "REDHAT", url: "http://www.redhat.com/support/errata/RHSA-2009-1694.html", }, { name: "35852", refsource: "SECUNIA", url: "http://secunia.com/advisories/35852", }, { name: "35854", refsource: "SECUNIA", url: "http://secunia.com/advisories/35854", }, { name: "34461", refsource: "SECUNIA", url: "http://secunia.com/advisories/34461", }, { name: "http://www.kb.cert.org/vuls/id/WDON-7TY529", refsource: "CONFIRM", url: "http://www.kb.cert.org/vuls/id/WDON-7TY529", }, { name: "http://www.mono-project.com/Vulnerabilities", refsource: "CONFIRM", url: "http://www.mono-project.com/Vulnerabilities", }, { name: "1020710", refsource: "SUNALERT", url: "http://sunsolve.sun.com/search/document.do?assetkey=1-77-1020710.1-1", }, { name: "USN-903-1", refsource: "UBUNTU", url: "http://www.ubuntu.com/usn/USN-903-1", }, { name: "35671", refsource: "BID", url: "http://www.securityfocus.com/bid/35671", }, { name: "https://issues.apache.org/bugzilla/show_bug.cgi?id=47527", refsource: "CONFIRM", url: "https://issues.apache.org/bugzilla/show_bug.cgi?id=47527", }, { name: "ADV-2010-0366", refsource: "VUPEN", url: "http://www.vupen.com/english/advisories/2010/0366", }, { name: "55907", refsource: "OSVDB", url: "http://osvdb.org/55907", }, { name: "MDVSA-2009:209", refsource: "MANDRIVA", url: "http://www.mandriva.com/security/advisories?name=MDVSA-2009:209", }, { name: "SUSE-SA:2010:017", refsource: "SUSE", url: "http://lists.opensuse.org/opensuse-security-announce/2010-03/msg00005.html", }, { name: "38567", refsource: "SECUNIA", url: "http://secunia.com/advisories/38567", }, { name: "FEDORA-2009-8329", refsource: "FEDORA", url: "https://www.redhat.com/archives/fedora-package-announce/2009-August/msg00310.html", }, { name: "263429", refsource: "SUNALERT", url: "http://sunsolve.sun.com/search/document.do?assetkey=1-66-263429-1", }, { name: "http://blogs.sun.com/security/entry/cert_vulnerability_note_vu_466161", refsource: "CONFIRM", url: "http://blogs.sun.com/security/entry/cert_vulnerability_note_vu_466161", }, { name: "SSRT090250", refsource: "HP", url: "http://marc.info/?l=bugtraq&m=125787273209737&w=2", }, { name: "ADV-2009-1900", refsource: "VUPEN", url: "http://www.vupen.com/english/advisories/2009/1900", }, { name: "1022561", refsource: "SECTRACK", url: "http://www.securitytracker.com/id?1022561", }, { name: "http://www.oracle.com/technetwork/topics/security/cpuoct2010-175626.html", refsource: "CONFIRM", url: "http://www.oracle.com/technetwork/topics/security/cpuoct2010-175626.html", }, { name: "37671", refsource: "SECUNIA", url: "http://secunia.com/advisories/37671", }, { name: "VU#466161", refsource: "CERT-VN", url: "http://www.kb.cert.org/vuls/id/466161", }, { name: "1022567", refsource: "SECTRACK", url: "http://www.securitytracker.com/id?1022567", }, { name: "RHSA-2009:1636", refsource: "REDHAT", url: "https://rhn.redhat.com/errata/RHSA-2009-1636.html", }, { name: "PK80627", refsource: "AIXAPAR", url: "http://www-01.ibm.com/support/docview.wss?rs=180&context=SSEQTP&dc=D400&uid=swg24023723&loc=en_US&cs=UTF-8&lang=en&rss=ct180websphere", }, { name: "RHSA-2009:1649", refsource: "REDHAT", url: "https://rhn.redhat.com/errata/RHSA-2009-1649.html", }, { name: "http://www.oracle.com/technetwork/topics/security/cpujul2009-091332.html", refsource: "CONFIRM", url: "http://www.oracle.com/technetwork/topics/security/cpujul2009-091332.html", }, { name: "TA09-294A", refsource: "CERT", url: "http://www.us-cert.gov/cas/techalerts/TA09-294A.html", }, { name: "ADV-2009-1909", refsource: "VUPEN", url: "http://www.vupen.com/english/advisories/2009/1909", }, { name: "ADV-2010-0635", refsource: "VUPEN", url: "http://www.vupen.com/english/advisories/2010/0635", }, { name: "http://svn.apache.org/viewvc?revision=794013&view=revision", refsource: "CONFIRM", url: "http://svn.apache.org/viewvc?revision=794013&view=revision", }, { name: "38568", refsource: "SECUNIA", url: "http://secunia.com/advisories/38568", }, { name: "36180", refsource: "SECUNIA", url: "http://secunia.com/advisories/36180", }, { name: "FEDORA-2009-8456", refsource: "FEDORA", url: "https://www.redhat.com/archives/fedora-package-announce/2009-August/msg00494.html", }, { name: "http://www.w3.org/2008/06/xmldsigcore-errata.html#e03", refsource: "CONFIRM", url: "http://www.w3.org/2008/06/xmldsigcore-errata.html#e03", }, { name: "USN-826-1", refsource: "UBUNTU", url: "https://usn.ubuntu.com/826-1/", }, { name: "37841", refsource: "SECUNIA", url: "http://secunia.com/advisories/37841", }, { name: "http://www.oracle.com/technetwork/topics/security/cpuoct2009-096303.html", refsource: "CONFIRM", url: "http://www.oracle.com/technetwork/topics/security/cpuoct2009-096303.html", }, { name: "http://sunsolve.sun.com/search/document.do?assetkey=1-21-125136-16-1", refsource: "CONFIRM", url: "http://sunsolve.sun.com/search/document.do?assetkey=1-21-125136-16-1", }, { name: "35855", refsource: "SECUNIA", url: "http://secunia.com/advisories/35855", }, { name: "FEDORA-2009-8473", refsource: "FEDORA", url: "https://www.redhat.com/archives/fedora-package-announce/2009-August/msg00505.html", }, { name: "36176", refsource: "SECUNIA", url: "http://secunia.com/advisories/36176", }, { name: "oval:org.mitre.oval:def:7158", refsource: "OVAL", url: "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7158", }, { name: "http://www.w3.org/QA/2009/07/hmac_truncation_in_xml_signatu.html", refsource: "MISC", url: "http://www.w3.org/QA/2009/07/hmac_truncation_in_xml_signatu.html", }, { name: "ADV-2009-1908", refsource: "VUPEN", url: "http://www.vupen.com/english/advisories/2009/1908", }, { name: "FEDORA-2009-8337", refsource: "FEDORA", url: "https://www.redhat.com/archives/fedora-package-announce/2009-August/msg00325.html", }, { name: "http://git.gnome.org/cgit/xmlsec/commit/?id=34b349675af9f72eb822837a8772cc1ead7115c7", refsource: "CONFIRM", url: "http://git.gnome.org/cgit/xmlsec/commit/?id=34b349675af9f72eb822837a8772cc1ead7115c7", }, { name: "http://www-01.ibm.com/support/docview.wss?rs=180&uid=swg21384925", refsource: "CONFIRM", url: "http://www-01.ibm.com/support/docview.wss?rs=180&uid=swg21384925", }, { name: "41818", refsource: "SECUNIA", url: "http://secunia.com/advisories/41818", }, { name: "1022661", refsource: "SECTRACK", url: "http://www.securitytracker.com/id?1022661", }, { name: "37300", refsource: "SECUNIA", url: "http://secunia.com/advisories/37300", }, { name: "ADV-2009-1911", refsource: "VUPEN", url: "http://www.vupen.com/english/advisories/2009/1911", }, { name: "APPLE-SA-2009-09-03-1", refsource: "APPLE", url: "http://lists.apple.com/archives/security-announce/2009/Sep/msg00000.html", }, { name: "SUSE-SA:2009:053", refsource: "SUSE", url: "http://lists.opensuse.org/opensuse-security-announce/2009-11/msg00002.html", }, { name: "oval:org.mitre.oval:def:8717", refsource: "OVAL", url: "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A8717", }, { name: "RHSA-2009:1201", refsource: "REDHAT", url: "https://rhn.redhat.com/errata/RHSA-2009-1201.html", }, { name: "http://git.gnome.org/cgit/xmlsec/patch/?id=34b349675af9f72eb822837a8772cc1ead7115c7", refsource: "CONFIRM", url: "http://git.gnome.org/cgit/xmlsec/patch/?id=34b349675af9f72eb822837a8772cc1ead7115c7", }, { name: "http://www.kb.cert.org/vuls/id/MAPG-7TSKXQ", refsource: "CONFIRM", url: "http://www.kb.cert.org/vuls/id/MAPG-7TSKXQ", }, { name: "TA10-159B", refsource: "CERT", url: "http://www.us-cert.gov/cas/techalerts/TA10-159B.html", }, { name: "oval:org.mitre.oval:def:10186", refsource: "OVAL", url: "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10186", }, { name: "55895", refsource: "OSVDB", url: "http://osvdb.org/55895", }, { name: "http://www.aleksey.com/xmlsec/", refsource: "CONFIRM", url: "http://www.aleksey.com/xmlsec/", }, { name: "MS10-041", refsource: "MS", url: "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2010/ms10-041", }, { name: "38921", refsource: "SECUNIA", url: "http://secunia.com/advisories/38921", }, { name: "RHSA-2009:1650", refsource: "REDHAT", url: "https://rhn.redhat.com/errata/RHSA-2009-1650.html", }, { name: "https://bugzilla.redhat.com/show_bug.cgi?id=511915", refsource: "CONFIRM", url: "https://bugzilla.redhat.com/show_bug.cgi?id=511915", }, ], }, }, }, }, cveMetadata: { assignerOrgId: "37e5125f-f79b-445b-8fad-9564f167944b", assignerShortName: "certcc", cveId: "CVE-2009-0217", datePublished: "2009-07-14T23:00:00", dateReserved: "2009-01-20T00:00:00", dateUpdated: "2024-08-07T04:24:18.400Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
Log in or create an account to share your comment.
This schema specifies the format of a comment related to a security advisory.
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.