Apache Santuario XML Security for C++ (aka xml-security-c) before 1.7.1 does not properly validate length values, which allows remote attackers to cause a denial of service or bypass the CVE-2009-0217 protection mechanism and spoof a signature via crafted length values to the (1) compareBase64StringToRaw, (2) DSIGAlgorithmHandlerDefault, or (3) DSIGAlgorithmHandlerDefault::verify functions.
References
Configurations
Configuration 1 (hide)
|
History
17 Sep 2021, 11:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
Information
Published : 2013-08-20 22:55
Updated : 2024-02-04 18:16
NVD link : CVE-2013-2155
Mitre link : CVE-2013-2155
CVE.ORG link : CVE-2013-2155
JSON object : View
Products Affected
apache
- xml_security_for_c\+\+
CWE
CWE-20
Improper Input Validation