CVE-2013-2155

MEDIUM

Description

Apache Santuario XML Security for C++ (aka xml-security-c) before 1.7.1 does not properly validate length values, which allows remote attackers to cause a denial of service or bypass the CVE-2009-0217 protection mechanism and spoof a signature via crafted length values to the (1) compareBase64StringToRaw, (2) DSIGAlgorithmHandlerDefault, or (3) DSIGAlgorithmHandlerDefault::verify functions.

References

http://archives.neohapsis.com/archives/fulldisclosure/2013-06/0142.html

http://santuario.apache.org/secadv.data/CVE-2013-2155.txt

http://svn.apache.org/viewvc/santuario/xml-security-cpp/trunk/xsec/dsig/DSIGAlgorithmHandlerDefault.cpp?r1=1125752&r2=1493960&pathrev=1493960&diff_format=h

http://www.debian.org/security/2013/dsa-2710

https://www.tenable.com/security/tns-2018-15

Details

Source: MITRE

Published: 2013-08-20

Updated: 2018-11-08

Type: CWE-20

Risk Information

CVSS v2.0

Base Score: 5.8

Vector: AV:N/AC:M/Au:N/C:N/I:P/A:P

Impact Score: 4.9

Exploitability Score: 8.6

Severity: MEDIUM