CVE-2013-2155
Published: 20 August 2013
Apache Santuario XML Security for C++ (aka xml-security-c) before 1.7.1 does not properly validate length values, which allows remote attackers to cause a denial of service or bypass the CVE-2009-0217 protection mechanism and spoof a signature via crafted length values to the (1) compareBase64StringToRaw, (2) DSIGAlgorithmHandlerDefault, or (3) DSIGAlgorithmHandlerDefault::verify functions.
Priority
Status
Package | Release | Status |
---|---|---|
xml-security-c Launchpad, Ubuntu, Debian |
lucid |
Released
(1.5.1-3+squeeze2build0.10.04.1)
|
precise |
Released
(1.6.1-1ubuntu0.1)
|
|
quantal |
Released
(1.6.1-6~build0.12.10.1)
|
|
raring |
Released
(1.6.1-6~build0.13.04.1)
|
|
upstream |
Released
(1.6.1-6)
|
|
Patches: vendor: http://www.debian.org/security/2013/dsa-2710 |