Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

oracle-oval логотип

ELSA-2009-1428

Опубликовано: 09 сент. 2009
Источник: oracle-oval
Платформа: Oracle Linux 5

Описание

ELSA-2009-1428: xmlsec1 security update (MODERATE)

[1.2.9-8.1.1]

  • Fix a security issue on short hmac lenght CVE-2009-0217
  • Resolves: rhbz#516724

Обновленные пакеты

Oracle Linux 5

Oracle Linux ia64

xmlsec1

1.2.9-8.1.1

xmlsec1-devel

1.2.9-8.1.1

xmlsec1-gnutls

1.2.9-8.1.1

xmlsec1-gnutls-devel

1.2.9-8.1.1

xmlsec1-nss

1.2.9-8.1.1

xmlsec1-nss-devel

1.2.9-8.1.1

xmlsec1-openssl

1.2.9-8.1.1

xmlsec1-openssl-devel

1.2.9-8.1.1

Oracle Linux x86_64

xmlsec1

1.2.9-8.1.1

xmlsec1-devel

1.2.9-8.1.1

xmlsec1-gnutls

1.2.9-8.1.1

xmlsec1-gnutls-devel

1.2.9-8.1.1

xmlsec1-nss

1.2.9-8.1.1

xmlsec1-nss-devel

1.2.9-8.1.1

xmlsec1-openssl

1.2.9-8.1.1

xmlsec1-openssl-devel

1.2.9-8.1.1

Oracle Linux i386

xmlsec1

1.2.9-8.1.1

xmlsec1-devel

1.2.9-8.1.1

xmlsec1-gnutls

1.2.9-8.1.1

xmlsec1-gnutls-devel

1.2.9-8.1.1

xmlsec1-nss

1.2.9-8.1.1

xmlsec1-nss-devel

1.2.9-8.1.1

xmlsec1-openssl

1.2.9-8.1.1

xmlsec1-openssl-devel

1.2.9-8.1.1

Связанные CVE

Связанные уязвимости

ubuntu
почти 16 лет назад

The design of the W3C XML Signature Syntax and Processing (XMLDsig) recommendation, as implemented in products including (1) the Oracle Security Developer Tools component in Oracle Application Server 10.1.2.3, 10.1.3.4, and 10.1.4.3IM; (2) the WebLogic Server component in BEA Product Suite 10.3, 10.0 MP1, 9.2 MP3, 9.1, 9.0, and 8.1 SP6; (3) Mono before 2.4.2.2; (4) XML Security Library before 1.2.12; (5) IBM WebSphere Application Server Versions 6.0 through 6.0.2.33, 6.1 through 6.1.0.23, and 7.0 through 7.0.0.1; (6) Sun JDK and JRE Update 14 and earlier; (7) Microsoft .NET Framework 3.0 through 3.0 SP2, 3.5, and 4.0; and other products uses a parameter that defines an HMAC truncation length (HMACOutputLength) but does not require a minimum for this length, which allows attackers to spoof HMAC-based signatures and bypass authentication by specifying a truncation length with a small number of bits.

redhat
почти 16 лет назад

The design of the W3C XML Signature Syntax and Processing (XMLDsig) recommendation, as implemented in products including (1) the Oracle Security Developer Tools component in Oracle Application Server 10.1.2.3, 10.1.3.4, and 10.1.4.3IM; (2) the WebLogic Server component in BEA Product Suite 10.3, 10.0 MP1, 9.2 MP3, 9.1, 9.0, and 8.1 SP6; (3) Mono before 2.4.2.2; (4) XML Security Library before 1.2.12; (5) IBM WebSphere Application Server Versions 6.0 through 6.0.2.33, 6.1 through 6.1.0.23, and 7.0 through 7.0.0.1; (6) Sun JDK and JRE Update 14 and earlier; (7) Microsoft .NET Framework 3.0 through 3.0 SP2, 3.5, and 4.0; and other products uses a parameter that defines an HMAC truncation length (HMACOutputLength) but does not require a minimum for this length, which allows attackers to spoof HMAC-based signatures and bypass authentication by specifying a truncation length with a small number of bits.

nvd
почти 16 лет назад

The design of the W3C XML Signature Syntax and Processing (XMLDsig) recommendation, as implemented in products including (1) the Oracle Security Developer Tools component in Oracle Application Server 10.1.2.3, 10.1.3.4, and 10.1.4.3IM; (2) the WebLogic Server component in BEA Product Suite 10.3, 10.0 MP1, 9.2 MP3, 9.1, 9.0, and 8.1 SP6; (3) Mono before 2.4.2.2; (4) XML Security Library before 1.2.12; (5) IBM WebSphere Application Server Versions 6.0 through 6.0.2.33, 6.1 through 6.1.0.23, and 7.0 through 7.0.0.1; (6) Sun JDK and JRE Update 14 and earlier; (7) Microsoft .NET Framework 3.0 through 3.0 SP2, 3.5, and 4.0; and other products uses a parameter that defines an HMAC truncation length (HMACOutputLength) but does not require a minimum for this length, which allows attackers to spoof HMAC-based signatures and bypass authentication by specifying a truncation length with a small number of bits.

debian
почти 16 лет назад

The design of the W3C XML Signature Syntax and Processing (XMLDsig) re ...

github
около 3 лет назад

Apache XML Security For Java vulnerable to authentication bypass by HMAC truncation