Off-by-one error in the XML signature feature in Apache XML Security for C++ 1.6.0, as used in Shibboleth before 2.4.3 and possibly other products, allows remote attackers to cause a denial of service (crash) via a signature using a large RSA key, which triggers a buffer overflow.
2011-07-11T20:55:01.380
2025-04-11T00:51:21.963
Deferred
CVSSv2: 5.0 (MEDIUM)
AV:N/AC:L/Au:N/C:N/I:N/A:P
10.0
2.9
Type | Vendor | Product | Version/Range | Vulnerable? |
---|---|---|---|---|
Application | apache | xml_security_for_c\+\+ | 1.6.0 | Yes |
Application | shibboleth | shibboleth-sp | ≤ 2.4.2 | Yes |
Application | shibboleth | shibboleth-sp | 1.3.1 | Yes |
Application | shibboleth | shibboleth-sp | 1.3.2 | Yes |
Application | shibboleth | shibboleth-sp | 1.3.3 | Yes |
Application | shibboleth | shibboleth-sp | 1.3.4 | Yes |
Application | shibboleth | shibboleth-sp | 1.3.5 | Yes |
Application | shibboleth | shibboleth-sp | 1.3f | Yes |
Application | shibboleth | shibboleth-sp | 2.0 | Yes |
Application | shibboleth | shibboleth-sp | 2.1 | Yes |
Application | shibboleth | shibboleth-sp | 2.2 | Yes |
Application | shibboleth | shibboleth-sp | 2.2.1 | Yes |
Application | shibboleth | shibboleth-sp | 2.3 | Yes |
Application | shibboleth | shibboleth-sp | 2.3.1 | Yes |
Application | shibboleth | shibboleth-sp | 2.4 | Yes |
Application | shibboleth | shibboleth-sp | 2.4.1 | Yes |