First published: Mon Jul 11 2011(Updated: )
Off-by-one error in the XML signature feature in Apache XML Security for C++ 1.6.0, as used in Shibboleth before 2.4.3 and possibly other products, allows remote attackers to cause a denial of service (crash) via a signature using a large RSA key, which triggers a buffer overflow.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Apache XML Security for C++ | =1.6.0 | |
Shibboleth Service Provider | <=2.4.2 | |
Shibboleth Service Provider | =1.3.1 | |
Shibboleth Service Provider | =1.3.2 | |
Shibboleth Service Provider | =1.3.3 | |
Shibboleth Service Provider | =1.3.4 | |
Shibboleth Service Provider | =1.3.5 | |
Shibboleth Service Provider | =1.3f | |
Shibboleth Service Provider | =2.0 | |
Shibboleth Service Provider | =2.1 | |
Shibboleth Service Provider | =2.2 | |
Shibboleth Service Provider | =2.2.1 | |
Shibboleth Service Provider | =2.3 | |
Shibboleth Service Provider | =2.3.1 | |
Shibboleth Service Provider | =2.4 | |
Shibboleth Service Provider | =2.4.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2011-2516 is categorized as a denial of service vulnerability that may lead to application crashes.
To fix CVE-2011-2516, upgrade to a corrected version of Apache XML Security for C++ or Shibboleth that addresses this vulnerability.
CVE-2011-2516 affects Apache XML Security for C++ 1.6.0 and versions of Shibboleth before 2.4.3, including several specific 1.x and 2.x versions.
CVE-2011-2516 enables remote attackers to crash the application through a crafted XML signature that triggers a buffer overflow.
Yes, CVE-2011-2516 is network-accessible as it can be exploited by remote attackers without physical access.