First published: Tue Nov 29 2016(Updated: )
Incorrect signature verification
Credit: security@debian.org security@debian.org
Affected Software | Affected Version | How to fix |
---|---|---|
composer/simplesamlphp/saml2 | <1.8.1>=1.9.0<1.9.1>=1.10<1.10.3>=2.0<2.3.3 | |
composer/simplesamlphp/saml2 | >=2.0<2.3.3 | 2.3.3 |
composer/simplesamlphp/saml2 | >=1.9.0<1.9.1 | 1.9.1 |
composer/simplesamlphp/saml2 | <1.8.1 | 1.8.1 |
composer/simplesamlphp/saml2 | >=1.10<1.10.3 | 1.10.3 |
SimpleSAMLphp | <=1.14.9 | |
SimpleSAMLphp | =1.10 | |
SimpleSAMLphp | <=1.9 | |
SimpleSAMLphp | =1.10 | |
SimpleSAMLphp | =1.10.1 | |
SimpleSAMLphp | =1.10.2 | |
SimpleSAMLphp | =2.0.0 | |
SimpleSAMLphp | =2.0.1 | |
SimpleSAMLphp | =2.1 | |
SimpleSAMLphp | =2.2 | |
SimpleSAMLphp | =2.3 | |
SimpleSAMLphp | =2.3.1 | |
SimpleSAMLphp | =2.3.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2016-9814 is considered a high severity vulnerability due to its potential for remote attackers to spoof SAML responses.
To fix CVE-2016-9814, upgrade to SimpleSAMLphp version 1.14.10 or later, or simplesamlphp/saml2 version 1.9.1, 1.10.3, or 2.3.3.
CVE-2016-9814 affects SimpleSAMLphp versions before 1.14.10 and simplesamlphp/saml2 library versions before 1.9.1, 1.10.3, and 2.3.3.
CVE-2016-9814 can allow attackers to spoof SAML responses and potentially cause a denial of service.
CVE-2016-9814 is classified as a remote vulnerability, enabling attackers to exploit the flaw from a distance.