Vulnerability   
Search   
    Search 191973 CVE descriptions
and 86218 test descriptions,
access 10,000+ cross references.
Tests   CVE   All  

Test ID:1.3.6.1.4.1.25623.1.0.702710
Category:Debian Local Security Checks
Title:Debian Security Advisory DSA 2710-1 (xml-security-c - several vulnerabilities)
Summary:James Forshaw from Context Information Security discovered several;vulnerabilities in xml-security-c, an implementation of the XML Digital;Security specification. The Common Vulnerabilities and Exposures project;identifies the following problems:;;CVE-2013-2153;The implementation of XML digital signatures in the Santuario-C++;library is vulnerable to a spoofing issue allowing an attacker to;reuse existing signatures with arbitrary content.;;CVE-2013-2154;A stack overflow, possibly leading to arbitrary code execution,;exists in the processing of malformed XPointer expressions in the;XML Signature Reference processing code.;;CVE-2013-2155;A bug in the processing of the output length of an HMAC-based XML;Signature would cause a denial of service when processing specially;chosen input.;;CVE-2013-2156;A heap overflow exists in the processing of the PrefixList attribute;optionally used in conjunction with Exclusive Canonicalization,;potentially allowing arbitrary code execution.
Description:Summary:
James Forshaw from Context Information Security discovered several
vulnerabilities in xml-security-c, an implementation of the XML Digital
Security specification. The Common Vulnerabilities and Exposures project
identifies the following problems:

CVE-2013-2153
The implementation of XML digital signatures in the Santuario-C++
library is vulnerable to a spoofing issue allowing an attacker to
reuse existing signatures with arbitrary content.

CVE-2013-2154
A stack overflow, possibly leading to arbitrary code execution,
exists in the processing of malformed XPointer expressions in the
XML Signature Reference processing code.

CVE-2013-2155
A bug in the processing of the output length of an HMAC-based XML
Signature would cause a denial of service when processing specially
chosen input.

CVE-2013-2156
A heap overflow exists in the processing of the PrefixList attribute
optionally used in conjunction with Exclusive Canonicalization,
potentially allowing arbitrary code execution.

Affected Software/OS:
xml-security-c on Debian Linux

Solution:
For the oldstable distribution (squeeze), these problems have been fixed in
version 1.5.1-3+squeeze2.

For the stable distribution (wheezy), these problems have been fixed in
version 1.6.1-5+deb7u1.

For the unstable distribution (sid), these problems have been fixed in
version 1.6.1-6.

We recommend that you upgrade your xml-security-c packages.

CVSS Score:
7.5

CVSS Vector:
AV:N/AC:L/Au:N/C:P/I:P/A:P

Cross-Ref: Common Vulnerability Exposure (CVE) ID: CVE-2013-2156
Debian Security Information: DSA-2710 (Google Search)
http://www.debian.org/security/2013/dsa-2710
http://archives.neohapsis.com/archives/fulldisclosure/2013-06/0143.html
http://svn.apache.org/viewvc?view=revision&revision=1493961
https://lists.apache.org/thread.html/680e6938b6412e26d5446054fd31de2011d33af11786b989127d1cc3@%3Ccommits.santuario.apache.org%3E
Common Vulnerability Exposure (CVE) ID: CVE-2013-2154
http://archives.neohapsis.com/archives/fulldisclosure/2013-06/0141.html
http://svn.apache.org/viewvc/santuario/xml-security-cpp/trunk/xsec/dsig/DSIGReference.cpp?r1=1125514&r2=1493959&pathrev=1493959&diff_format=h
Common Vulnerability Exposure (CVE) ID: CVE-2013-2153
http://archives.neohapsis.com/archives/fulldisclosure/2013-06/0140.html
Common Vulnerability Exposure (CVE) ID: CVE-2013-2155
http://archives.neohapsis.com/archives/fulldisclosure/2013-06/0142.html
http://svn.apache.org/viewvc/santuario/xml-security-cpp/trunk/xsec/dsig/DSIGAlgorithmHandlerDefault.cpp?r1=1125752&r2=1493960&pathrev=1493960&diff_format=h
CopyrightCopyright (C) 2013 Greenbone Networks GmbH http://greenbone.net

This is only one of 86218 vulnerability tests in our test suite. Find out more about running a complete security audit.

To run a free test of this vulnerability against your system, register below.




© 1998-2020 E-Soft Inc. All rights reserved.