Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2009-0217

Опубликовано: 14 июл. 2009
Источник: ubuntu
Приоритет: medium
EPSS Средний
CVSS2: 5

Описание

The design of the W3C XML Signature Syntax and Processing (XMLDsig) recommendation, as implemented in products including (1) the Oracle Security Developer Tools component in Oracle Application Server 10.1.2.3, 10.1.3.4, and 10.1.4.3IM; (2) the WebLogic Server component in BEA Product Suite 10.3, 10.0 MP1, 9.2 MP3, 9.1, 9.0, and 8.1 SP6; (3) Mono before 2.4.2.2; (4) XML Security Library before 1.2.12; (5) IBM WebSphere Application Server Versions 6.0 through 6.0.2.33, 6.1 through 6.1.0.23, and 7.0 through 7.0.0.1; (6) Sun JDK and JRE Update 14 and earlier; (7) Microsoft .NET Framework 3.0 through 3.0 SP2, 3.5, and 4.0; and other products uses a parameter that defines an HMAC truncation length (HMACOutputLength) but does not require a minimum for this length, which allows attackers to spoof HMAC-based signatures and bypass authentication by specifying a truncation length with a small number of bits.

РелизСтатусПримечание
dapper

DNE

devel

not-affected

hardy

DNE

intrepid

DNE

jaunty

DNE

karmic

DNE

lucid

DNE

maverick

DNE

natty

not-affected

oneiric

not-affected

Показывать по

РелизСтатусПримечание
dapper

DNE

devel

not-affected

1.4.3-0ubuntu1
hardy

DNE

intrepid

ignored

end of life, was needed
jaunty

ignored

end of life
karmic

not-affected

1.4.3-0ubuntu1
lucid

not-affected

1.4.3-0ubuntu1
maverick

not-affected

1.4.3-0ubuntu1
natty

not-affected

1.4.3-0ubuntu1
oneiric

not-affected

1.4.3-0ubuntu1

Показывать по

РелизСтатусПримечание
dapper

ignored

end of life
devel

not-affected

2.4.2.3+dfsg-1
hardy

released

1.2.6+dfsg-6ubuntu3.1
intrepid

released

1.9.1+dfsg-4ubuntu2.1
jaunty

released

2.0.1-4ubuntu0.1
karmic

not-affected

2.4.2.3+dfsg-1
lucid

not-affected

2.4.2.3+dfsg-1
maverick

not-affected

2.4.2.3+dfsg-1
natty

not-affected

2.4.2.3+dfsg-1
oneiric

not-affected

2.4.2.3+dfsg-1

Показывать по

РелизСтатусПримечание
dapper

DNE

devel

not-affected

hardy

released

6b18-1.8.2-4ubuntu1~8.04.1
intrepid

released

6b12-0ubuntu6.5
jaunty

released

6b14-1.4.1-0ubuntu11
karmic

not-affected

lucid

not-affected

maverick

not-affected

natty

not-affected

oneiric

not-affected

Показывать по

РелизСтатусПримечание
dapper

ignored

end of life
devel

DNE

hardy

released

1:2.4.1-1ubuntu2.3
intrepid

released

1:2.4.1-11ubuntu2.3
jaunty

released

1:3.0.1-9ubuntu3.2
karmic

released

1:3.1.1-5ubuntu1.1
lucid

not-affected

1:3.2.0~rc4-1ubuntu1
maverick

not-affected

1:3.2.0~rc4-1ubuntu1
natty

not-affected

transitional package
oneiric

not-affected

transitional package

Показывать по

РелизСтатусПримечание
dapper

DNE

devel

not-affected

1.4.0-4
hardy

ignored

end of life
intrepid

ignored

end of life, was needed
jaunty

released

1.4.0-3+lenny2build0.9.04.1
karmic

not-affected

1.4.0-4
lucid

not-affected

1.4.0-4
maverick

not-affected

1.4.0-4
natty

not-affected

1.4.0-4
oneiric

not-affected

1.4.0-4

Показывать по

РелизСтатусПримечание
dapper

ignored

end of life
devel

not-affected

1.2.14-1
hardy

ignored

end of life
intrepid

ignored

end of life, was needed
jaunty

ignored

end of life
karmic

ignored

end of life
lucid

ignored

end of life
maverick

not-affected

1.2.14-1
natty

not-affected

1.2.14-1
oneiric

not-affected

1.2.14-1

Показывать по

EPSS

Процентиль: 97%
0.32289
Средний

5 Medium

CVSS2

Связанные уязвимости

redhat
около 16 лет назад

The design of the W3C XML Signature Syntax and Processing (XMLDsig) recommendation, as implemented in products including (1) the Oracle Security Developer Tools component in Oracle Application Server 10.1.2.3, 10.1.3.4, and 10.1.4.3IM; (2) the WebLogic Server component in BEA Product Suite 10.3, 10.0 MP1, 9.2 MP3, 9.1, 9.0, and 8.1 SP6; (3) Mono before 2.4.2.2; (4) XML Security Library before 1.2.12; (5) IBM WebSphere Application Server Versions 6.0 through 6.0.2.33, 6.1 through 6.1.0.23, and 7.0 through 7.0.0.1; (6) Sun JDK and JRE Update 14 and earlier; (7) Microsoft .NET Framework 3.0 through 3.0 SP2, 3.5, and 4.0; and other products uses a parameter that defines an HMAC truncation length (HMACOutputLength) but does not require a minimum for this length, which allows attackers to spoof HMAC-based signatures and bypass authentication by specifying a truncation length with a small number of bits.

nvd
около 16 лет назад

The design of the W3C XML Signature Syntax and Processing (XMLDsig) recommendation, as implemented in products including (1) the Oracle Security Developer Tools component in Oracle Application Server 10.1.2.3, 10.1.3.4, and 10.1.4.3IM; (2) the WebLogic Server component in BEA Product Suite 10.3, 10.0 MP1, 9.2 MP3, 9.1, 9.0, and 8.1 SP6; (3) Mono before 2.4.2.2; (4) XML Security Library before 1.2.12; (5) IBM WebSphere Application Server Versions 6.0 through 6.0.2.33, 6.1 through 6.1.0.23, and 7.0 through 7.0.0.1; (6) Sun JDK and JRE Update 14 and earlier; (7) Microsoft .NET Framework 3.0 through 3.0 SP2, 3.5, and 4.0; and other products uses a parameter that defines an HMAC truncation length (HMACOutputLength) but does not require a minimum for this length, which allows attackers to spoof HMAC-based signatures and bypass authentication by specifying a truncation length with a small number of bits.

debian
около 16 лет назад

The design of the W3C XML Signature Syntax and Processing (XMLDsig) re ...

github
больше 3 лет назад

Apache XML Security For Java vulnerable to authentication bypass by HMAC truncation

oracle-oval
почти 16 лет назад

ELSA-2009-1428: xmlsec1 security update (MODERATE)

EPSS

Процентиль: 97%
0.32289
Средний

5 Medium

CVSS2

Уязвимость CVE-2009-0217