First published: Tue Feb 27 2018(Updated: )
Shibboleth XMLTooling-C before 1.6.4, as used in Shibboleth Service Provider before 2.6.1.4 on Windows and other products, mishandles digital signatures of user data, which allows remote attackers to obtain sensitive information or conduct impersonation attacks via crafted XML data. NOTE: this issue exists because of an incomplete fix for CVE-2018-0486.
Credit: security@debian.org
Affected Software | Affected Version | How to fix |
---|---|---|
debian/xmltooling | 3.0.4-1+deb10u1 3.0.4-1+deb10u2 3.2.0-3+deb11u1 3.2.3-1+deb12u1 3.2.4-2 | |
Shibboleth XMLTooling-C | <1.6.4 | |
Debian Debian Linux | =7.0 | |
Debian Debian Linux | =8.0 | |
Debian Debian Linux | =9.0 | |
Arubanetworks Clearpass | >=6.6.0<=6.6.9 | |
Arubanetworks Clearpass | >=6.7.0<6.7.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this Shibboleth XMLTooling-C vulnerability is CVE-2018-0489.
The severity of CVE-2018-0489 is medium.
This vulnerability affects Shibboleth Service Provider before 2.6.1.4 on Windows and other products.
This vulnerability can be exploited by remote attackers using crafted XML data to obtain sensitive information or conduct impersonation attacks.
Yes, remediation steps are available. Please refer to the provided references for more information.