First published: Wed Nov 06 2019(Updated: )
Critical signature bypass
Credit: security@debian.org security@debian.org
Affected Software | Affected Version | How to fix |
---|---|---|
composer/robrichards/xmlseclibs | >=1.0.0<2.0.0>=2.0.0<2.1.1>=3.0.0<3.0.4 | |
debian/simplesamlphp | 1.16.3-1+deb10u2 1.16.3-1+deb10u1 1.19.0-1 1.19.7-1 | |
Xmlseclibs Project Xmlseclibs | >=1.0.0<=1.4.2 | |
Xmlseclibs Project Xmlseclibs | >=2.0.0<=2.1.0 | |
Xmlseclibs Project Xmlseclibs | >=3.0.0<=3.0.3 | |
Debian Debian Linux | =8.0 | |
Debian Debian Linux | =9.0 | |
Debian Debian Linux | =10.0 | |
Simplesamlphp Simplesamlphp | <=1.17.6 | |
composer/robrichards/xmlseclibs | >=1.0.0<2.1.1 | 2.1.1 |
composer/robrichards/xmlseclibs | >=3.0.0<3.0.4 | 3.0.4 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2019-3465 is a vulnerability in Rob Richards XmlSecLibs that allows an authenticated attacker to impersonate others or elevate privileges by creating a crafted XML message.
XmlSecLibs versions prior to v3.0.3 are affected, as well as SimpleSAMLphp versions 1.16.3-1+deb10u2, 1.16.3-1+deb10u1, 1.19.0-1, and 1.19.7-1.
CVE-2019-3465 has a severity rating of 8.8 (high).
To fix CVE-2019-3465, update to XmlSecLibs version 3.0.3 and SimpleSAMLphp versions 1.16.3-1+deb10u2, 1.16.3-1+deb10u1, 1.19.0-1, or 1.19.7-1.
You can find more information about CVE-2019-3465 at the following references: [1] [2] [3].