Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2009-0217

Опубликовано: 14 июл. 2009
Источник: redhat
CVSS2: 5
EPSS Средний

Описание

The design of the W3C XML Signature Syntax and Processing (XMLDsig) recommendation, as implemented in products including (1) the Oracle Security Developer Tools component in Oracle Application Server 10.1.2.3, 10.1.3.4, and 10.1.4.3IM; (2) the WebLogic Server component in BEA Product Suite 10.3, 10.0 MP1, 9.2 MP3, 9.1, 9.0, and 8.1 SP6; (3) Mono before 2.4.2.2; (4) XML Security Library before 1.2.12; (5) IBM WebSphere Application Server Versions 6.0 through 6.0.2.33, 6.1 through 6.1.0.23, and 7.0 through 7.0.0.1; (6) Sun JDK and JRE Update 14 and earlier; (7) Microsoft .NET Framework 3.0 through 3.0 SP2, 3.5, and 4.0; and other products uses a parameter that defines an HMAC truncation length (HMACOutputLength) but does not require a minimum for this length, which allows attackers to spoof HMAC-based signatures and bypass authentication by specifying a truncation length with a small number of bits.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Enterprise Linux Extended Update Support 4.8xmlsec1Affected
Red Hat Enterprise Linux Extended Update Support 5.3java-1.6.0-openjdkAffected
Red Hat Enterprise Linux Extended Update Support 5.3xmlsec1Affected
Extras for RHEL 4java-1.6.0-sunFixedRHSA-2009:120006.08.2009
Extras for RHEL 4java-1.6.0-ibmFixedRHSA-2009:169423.12.2009
JBEAP 4.2.0 for RHEL 4glassfish-javamailFixedRHSA-2009:163709.12.2009
JBEAP 4.2.0 for RHEL 4glassfish-jsfFixedRHSA-2009:163709.12.2009
JBEAP 4.2.0 for RHEL 4hibernate3FixedRHSA-2009:163709.12.2009
JBEAP 4.2.0 for RHEL 4hibernate3-annotationsFixedRHSA-2009:163709.12.2009
JBEAP 4.2.0 for RHEL 4hibernate3-entitymanagerFixedRHSA-2009:163709.12.2009

Показывать по

Дополнительная информация

Статус:

Moderate
https://bugzilla.redhat.com/show_bug.cgi?id=511915xml-security-1.3.0-1jpp.ep1.*: XMLDsig HMAC-based signatures spoofing and authentication bypass

EPSS

Процентиль: 97%
0.34983
Средний

5 Medium

CVSS2

Связанные уязвимости

ubuntu
почти 16 лет назад

The design of the W3C XML Signature Syntax and Processing (XMLDsig) recommendation, as implemented in products including (1) the Oracle Security Developer Tools component in Oracle Application Server 10.1.2.3, 10.1.3.4, and 10.1.4.3IM; (2) the WebLogic Server component in BEA Product Suite 10.3, 10.0 MP1, 9.2 MP3, 9.1, 9.0, and 8.1 SP6; (3) Mono before 2.4.2.2; (4) XML Security Library before 1.2.12; (5) IBM WebSphere Application Server Versions 6.0 through 6.0.2.33, 6.1 through 6.1.0.23, and 7.0 through 7.0.0.1; (6) Sun JDK and JRE Update 14 and earlier; (7) Microsoft .NET Framework 3.0 through 3.0 SP2, 3.5, and 4.0; and other products uses a parameter that defines an HMAC truncation length (HMACOutputLength) but does not require a minimum for this length, which allows attackers to spoof HMAC-based signatures and bypass authentication by specifying a truncation length with a small number of bits.

nvd
почти 16 лет назад

The design of the W3C XML Signature Syntax and Processing (XMLDsig) recommendation, as implemented in products including (1) the Oracle Security Developer Tools component in Oracle Application Server 10.1.2.3, 10.1.3.4, and 10.1.4.3IM; (2) the WebLogic Server component in BEA Product Suite 10.3, 10.0 MP1, 9.2 MP3, 9.1, 9.0, and 8.1 SP6; (3) Mono before 2.4.2.2; (4) XML Security Library before 1.2.12; (5) IBM WebSphere Application Server Versions 6.0 through 6.0.2.33, 6.1 through 6.1.0.23, and 7.0 through 7.0.0.1; (6) Sun JDK and JRE Update 14 and earlier; (7) Microsoft .NET Framework 3.0 through 3.0 SP2, 3.5, and 4.0; and other products uses a parameter that defines an HMAC truncation length (HMACOutputLength) but does not require a minimum for this length, which allows attackers to spoof HMAC-based signatures and bypass authentication by specifying a truncation length with a small number of bits.

debian
почти 16 лет назад

The design of the W3C XML Signature Syntax and Processing (XMLDsig) re ...

github
около 3 лет назад

Apache XML Security For Java vulnerable to authentication bypass by HMAC truncation

oracle-oval
почти 16 лет назад

ELSA-2009-1428: xmlsec1 security update (MODERATE)

EPSS

Процентиль: 97%
0.34983
Средний

5 Medium

CVSS2