FreshPorts - VuXML

This page displays vulnerability information about FreeBSD Ports.

The VUXML data was last processed by FreshPorts on 2024-03-27 18:04:16 UTC

List all Vulnerabilities, by package

List all Vulnerabilities, by date

k68

These are the vulnerabilities relating to the commit you have selected:

VuXML IDDescription
b202e4ce-3114-11e5-aa32-0026551a22dcshibboleth-sp -- DoS vulnerability

Shibboleth consortium reports:

Shibboleth SP software crashes on well-formed but invalid XML.

The Service Provider software contains a code path with an uncaught exception that can be triggered by an unauthenticated attacker by supplying well-formed but schema-invalid XML in the form of SAML metadata or SAML protocol messages. The result is a crash and so causes a denial of service.

You must rebuild opensaml and shibboleth with xmltooling-1.5.5 or later. The easiest way to do so is to update the whole chain including shibboleth-2.5.5 an opensaml2.5.5.


Discovery 2015-07-21
Entry 2015-07-23
xmltooling
< 1.5.5

opensaml2
< 2.5.5

shibboleth-sp
< 2.5.5

http://shibboleth.net/community/advisories/secadv_20150721.txt
CVE-2015-2684
9f14cb36-b6fc-11e0-a044-445c73746d79opensaml2 -- unauthenticated login

OpenSAML developer reports:

The Shibboleth software relies on the OpenSAML libraries to perform verification of signed XML messages such as attribute queries or SAML assertions. Both the Java and C++ versions are vulnerable to a so-called "wrapping attack" that allows a remote, unauthenticated attacker to craft specially formed messages that can be successfully verified, but contain arbitrary content.


Discovery 2011-07-25
Entry 2011-07-25
opensaml2
gt 0 lt 2.4.3

CVE-2011-1411
https://groups.google.com/a/shibboleth.net/group/announce/browse_thread/thread/cf3e0d76afbb57d9