First published: Thu Jun 02 2011(Updated: )
The rampart_timestamp_token_validate function in util/rampart_timestamp_token.c in Apache Rampart/C 1.3.0 does not properly calculate the expiration of timestamp tokens, which allows remote attackers to bypass intended access restrictions by leveraging an expired token, a different vulnerability than CVE-2011-0730.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Apache Rampart/c | =1.3.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2011-2329 is considered a medium severity vulnerability due to its potential to allow access restriction bypass.
To fix CVE-2011-2329, upgrade to a version of Apache Rampart/C that is not affected by this vulnerability.
CVE-2011-2329 exploits a flaw in the timestamp token validation process that allows the use of expired tokens.
CVE-2011-2329 specifically affects Apache Rampart/C version 1.3.0.
Yes, CVE-2011-2329 can lead to unauthorized access by allowing attackers to use expired timestamp tokens.