First published: Tue Sep 29 2009(Updated: )
OpenSAML 2.x before 2.2.1 and XMLTooling 1.x before 1.2.1, as used by Internet2 Shibboleth Service Provider 2.x before 2.2.1, do not follow the KeyDescriptor element's Use attribute, which allows remote attackers to use a certificate for both signing and encryption when it is designated for just one purpose, potentially weakening the intended security application of the certificate.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Internet2 OpenSAML | =2.0 | |
Internet2 OpenSAML | =2.1.0 | |
Internet2 OpenSAML | =2.2.0 | |
Shibboleth XMLTooling-C | =1.0.1 | |
Shibboleth XMLTooling-C | =1.1.0 | |
Shibboleth XMLTooling-C | =1.1.1 | |
Shibboleth XMLTooling-C | =1.2.0 | |
Shibboleth Service Provider | =1.3.1 | |
Shibboleth Service Provider | =1.3.2 | |
Shibboleth Service Provider | =1.3b | |
Shibboleth Service Provider | =1.3f | |
Shibboleth Service Provider | =2.0 | |
Shibboleth Service Provider | =2.1 | |
Shibboleth Service Provider | =2.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2009-3474 is classified as a high-severity vulnerability due to its potential for remote exploitation.
To fix CVE-2009-3474, upgrade to OpenSAML version 2.2.1 or XMLTooling version 1.2.1 or later.
CVE-2009-3474 affects OpenSAML versions 2.x before 2.2.1 and XMLTooling 1.x before 1.2.1, particularly when used with Shibboleth Service Provider 2.x before 2.2.1.
The risks of CVE-2009-3474 include allowing attackers to use a certificate intended for single purpose (signing or encryption) for both roles.
Currently, there are no specified workarounds for CVE-2009-3474, and it is recommended to apply an upgrade as soon as possible.