CVE-2011-2516

Off-by-one error in the XML signature feature in Apache XML Security for C++ 1.6.0, as used in Shibboleth before 2.4.3 and possibly other products, allows remote attackers to cause a denial of service (crash) via a signature using a large RSA key, which triggers a buffer overflow.
References
Link Resource
http://lists.fedoraproject.org/pipermail/package-announce/2011-July/063159.html
http://lists.fedoraproject.org/pipermail/package-announce/2011-July/063229.html
http://santuario.apache.org/secadv/CVE-2011-2516.txt Vendor Advisory
http://secunia.com/advisories/45151 Vendor Advisory
http://secunia.com/advisories/45191 Vendor Advisory
http://secunia.com/advisories/45198
http://secunia.com/advisories/45491
http://shibboleth.internet2.edu/secadv/secadv_20110706.txt Vendor Advisory
http://www.debian.org/security/2011/dsa-2277
http://www.securityfocus.com/archive/1/518756/100/0/threaded
http://www.securityfocus.com/bid/48611
http://www.securitytracker.com/id?1025755
https://exchange.xforce.ibmcloud.com/vulnerabilities/68420
https://issues.apache.org/jira/browse/SANTUARIO-271 Exploit
https://lists.apache.org/thread.html/680e6938b6412e26d5446054fd31de2011d33af11786b989127d1cc3%40%3Ccommits.santuario.apache.org%3E
https://lists.apache.org/thread.html/r1c07a561426ec5579073046ad7f4207cdcef452bb3100abaf908e0cd%40%3Ccommits.santuario.apache.org%3E
http://lists.fedoraproject.org/pipermail/package-announce/2011-July/063159.html
http://lists.fedoraproject.org/pipermail/package-announce/2011-July/063229.html
http://santuario.apache.org/secadv/CVE-2011-2516.txt Vendor Advisory
http://secunia.com/advisories/45151 Vendor Advisory
http://secunia.com/advisories/45191 Vendor Advisory
http://secunia.com/advisories/45198
http://secunia.com/advisories/45491
http://shibboleth.internet2.edu/secadv/secadv_20110706.txt Vendor Advisory
http://www.debian.org/security/2011/dsa-2277
http://www.securityfocus.com/archive/1/518756/100/0/threaded
http://www.securityfocus.com/bid/48611
http://www.securitytracker.com/id?1025755
https://exchange.xforce.ibmcloud.com/vulnerabilities/68420
https://issues.apache.org/jira/browse/SANTUARIO-271 Exploit
https://lists.apache.org/thread.html/680e6938b6412e26d5446054fd31de2011d33af11786b989127d1cc3%40%3Ccommits.santuario.apache.org%3E
https://lists.apache.org/thread.html/r1c07a561426ec5579073046ad7f4207cdcef452bb3100abaf908e0cd%40%3Ccommits.santuario.apache.org%3E
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:apache:xml_security_for_c\+\+:1.6.0:*:*:*:*:*:*:*
cpe:2.3:a:shibboleth:shibboleth-sp:*:*:*:*:*:*:*:*
cpe:2.3:a:shibboleth:shibboleth-sp:1.3.1:*:*:*:*:*:*:*
cpe:2.3:a:shibboleth:shibboleth-sp:1.3.2:*:*:*:*:*:*:*
cpe:2.3:a:shibboleth:shibboleth-sp:1.3.3:*:*:*:*:*:*:*
cpe:2.3:a:shibboleth:shibboleth-sp:1.3.4:*:*:*:*:*:*:*
cpe:2.3:a:shibboleth:shibboleth-sp:1.3.5:*:*:*:*:*:*:*
cpe:2.3:a:shibboleth:shibboleth-sp:1.3f:*:*:*:*:*:*:*
cpe:2.3:a:shibboleth:shibboleth-sp:2.0:*:*:*:*:*:*:*
cpe:2.3:a:shibboleth:shibboleth-sp:2.1:*:*:*:*:*:*:*
cpe:2.3:a:shibboleth:shibboleth-sp:2.2:*:*:*:*:*:*:*
cpe:2.3:a:shibboleth:shibboleth-sp:2.2.1:*:*:*:*:*:*:*
cpe:2.3:a:shibboleth:shibboleth-sp:2.3:*:*:*:*:*:*:*
cpe:2.3:a:shibboleth:shibboleth-sp:2.3.1:*:*:*:*:*:*:*
cpe:2.3:a:shibboleth:shibboleth-sp:2.4:*:*:*:*:*:*:*
cpe:2.3:a:shibboleth:shibboleth-sp:2.4.1:*:*:*:*:*:*:*

History

21 Nov 2024, 01:28

Type Values Removed Values Added
References () http://lists.fedoraproject.org/pipermail/package-announce/2011-July/063159.html - () http://lists.fedoraproject.org/pipermail/package-announce/2011-July/063159.html -
References () http://lists.fedoraproject.org/pipermail/package-announce/2011-July/063229.html - () http://lists.fedoraproject.org/pipermail/package-announce/2011-July/063229.html -
References () http://santuario.apache.org/secadv/CVE-2011-2516.txt - Vendor Advisory () http://santuario.apache.org/secadv/CVE-2011-2516.txt - Vendor Advisory
References () http://secunia.com/advisories/45151 - Vendor Advisory () http://secunia.com/advisories/45151 - Vendor Advisory
References () http://secunia.com/advisories/45191 - Vendor Advisory () http://secunia.com/advisories/45191 - Vendor Advisory
References () http://secunia.com/advisories/45198 - () http://secunia.com/advisories/45198 -
References () http://secunia.com/advisories/45491 - () http://secunia.com/advisories/45491 -
References () http://shibboleth.internet2.edu/secadv/secadv_20110706.txt - Vendor Advisory () http://shibboleth.internet2.edu/secadv/secadv_20110706.txt - Vendor Advisory
References () http://www.debian.org/security/2011/dsa-2277 - () http://www.debian.org/security/2011/dsa-2277 -
References () http://www.securityfocus.com/archive/1/518756/100/0/threaded - () http://www.securityfocus.com/archive/1/518756/100/0/threaded -
References () http://www.securityfocus.com/bid/48611 - () http://www.securityfocus.com/bid/48611 -
References () http://www.securitytracker.com/id?1025755 - () http://www.securitytracker.com/id?1025755 -
References () https://exchange.xforce.ibmcloud.com/vulnerabilities/68420 - () https://exchange.xforce.ibmcloud.com/vulnerabilities/68420 -
References () https://issues.apache.org/jira/browse/SANTUARIO-271 - Exploit () https://issues.apache.org/jira/browse/SANTUARIO-271 - Exploit
References () https://lists.apache.org/thread.html/680e6938b6412e26d5446054fd31de2011d33af11786b989127d1cc3%40%3Ccommits.santuario.apache.org%3E - () https://lists.apache.org/thread.html/680e6938b6412e26d5446054fd31de2011d33af11786b989127d1cc3%40%3Ccommits.santuario.apache.org%3E -
References () https://lists.apache.org/thread.html/r1c07a561426ec5579073046ad7f4207cdcef452bb3100abaf908e0cd%40%3Ccommits.santuario.apache.org%3E - () https://lists.apache.org/thread.html/r1c07a561426ec5579073046ad7f4207cdcef452bb3100abaf908e0cd%40%3Ccommits.santuario.apache.org%3E -

Information

Published : 2011-07-11 20:55

Updated : 2024-11-21 01:28


NVD link : CVE-2011-2516

Mitre link : CVE-2011-2516

CVE.ORG link : CVE-2011-2516


JSON object : View

Products Affected

shibboleth

  • shibboleth-sp

apache

  • xml_security_for_c\+\+
CWE
CWE-189

Numeric Errors