First published: Thu Nov 07 2019(Updated: )
The keygen.sh script in Shibboleth SP 2.0 (located in /usr/local/etc/shibboleth by default) uses OpenSSL to create a DES private key which is placed in sp-key.pm. It relies on the root umask (default 22) instead of chmoding the resulting file itself, so the generated private key is world readable by default.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
debian/shibboleth-sp | 3.2.2+dfsg1-1 3.4.1+dfsg-2 3.4.1+dfsg-2.1 | |
Internet2 Shibboleth Service Provider | =2.0 | |
Debian Debian Linux | =8.0 | |
Debian Debian Linux | =9.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID is CVE-2010-2450.
The severity of CVE-2010-2450 is high with a score of 7.5.
The keygen.sh script in Shibboleth SP 2.0 uses OpenSSL to create a DES private key.
The generated private key is placed in sp-key.pm.
Yes, the generated private key is world readable.
The affected software is Shibboleth Service Provider 2.0 and Debian Debian Linux 8.0 and 9.0.
You can fix CVE-2010-2450 by updating to version 3.0.4+dfsg1-1+deb10u2 or higher for Debian or applying the necessary updates for Shibboleth Service Provider.