Executive Summary
Summary | |
---|---|
Title | New Shibboleth 1.x packages fix potential code execution |
Informations | |||
---|---|---|---|
Name | DSA-1896 | First vendor Publication | 2009-09-28 |
Vendor | Debian | Last vendor Modification | 2009-09-28 |
Severity (Vendor) | N/A | Revision | 1 |
Security-Database Scoring CVSS v3
Cvss vector : N/A | |||
---|---|---|---|
Overall CVSS Score | NA | ||
Base Score | NA | Environmental Score | NA |
impact SubScore | NA | Temporal Score | NA |
Exploitabality Sub Score | NA | ||
Calculate full CVSS 3.0 Vectors scores |
Security-Database Scoring CVSS v2
Cvss vector : (AV:N/AC:L/Au:N/C:P/I:P/A:P) | |||
---|---|---|---|
Cvss Base Score | 7.5 | Attack Range | Network |
Cvss Impact Score | 6.4 | Attack Complexity | Low |
Cvss Expoit Score | 10 | Authentication | None Required |
Calculate full CVSS 2.0 Vectors scores |
Detail
Several vulnerabilities have been discovered in the opensaml and shibboleth-sp packages, as used by Shibboleth 1.x: Chris Ries discovered that decoding a crafted URL leads to a crash (and potentially, arbitrary code execution). Ian Young discovered that embedded NUL characters in certificate names were not correctly handled, exposing configurations using PKIX trust validation to impersonation attacks. Incorrect processing of SAML metadata ignored key usage constraints. For the old stable distribution (etch), these problems have been fixed in version 1.3f.dfsg1-2+etch1 of the shibboleth-sp packages, and version 1.1a-2+etch1 of the opensaml packages. For the stable distribution (lenny), these problems have been fixed in version 1.3.1.dfsg1-3+lenny1 of the shibboleth-sp packages, and version 1.1.1-2+lenny1 of the opensaml packages. The unstable distribution (sid) does not contain Shibboleth 1.x packages. This update requires restarting the affected services (mainly Apache) to become effective. We recommend that you upgrade your Shibboleth 1.x packages. |
Original Source
Url : http://www.debian.org/security/2009/dsa-1896 |
CWE : Common Weakness Enumeration
% | Id | Name |
---|---|---|
100 % | CWE-310 | Cryptographic Issues |
CPE : Common Platform Enumeration
OpenVAS Exploits
Date | Description |
---|---|
2009-10-19 | Name : Debian Security Advisory DSA 1895-2 (opensaml2, shibboleth-sp2) File : nvt/deb_1895_2.nasl |
2009-10-15 | Name : Shibboleth Service Provider NULL Character Spoofing Vulnerability (Win) File : nvt/gb_shibboleth_sp_null_char_spoofing_vuln_win.nasl |
2009-10-06 | Name : Debian Security Advisory DSA 1896-1 (opensaml, shibboleth-sp) File : nvt/deb_1896_1.nasl |
2009-09-28 | Name : Debian Security Advisory DSA 1895-1 (xmltooling) File : nvt/deb_1895_1.nasl |
Open Source Vulnerability Database (OSVDB)
Id | Description |
---|---|
58392 | OpenSAML KeyDescriptor Element use Tag Metadata Security Bypass |
58378 | Shibboleth SSL Certificate Multiple Field Null Byte Handling SSL MiTM Weakness |
Nessus® Vulnerability Scanner
Date | Description |
---|---|
2010-02-24 | Name : The remote Debian host is missing a security-related update. File : debian_DSA-1895.nasl - Type : ACT_GATHER_INFO |
2010-02-24 | Name : The remote Debian host is missing a security-related update. File : debian_DSA-1896.nasl - Type : ACT_GATHER_INFO |
Alert History
Date | Informations |
---|---|
2014-02-17 11:28:51 |
|