FreeBSD : shibboleth-sp -- DoS vulnerability (b202e4ce-3114-11e5-aa32-0026551a22dc)

medium Nessus Plugin ID 84995

Synopsis

The remote FreeBSD host is missing one or more security-related updates.

Description

Shibboleth consortium reports :

Shibboleth SP software crashes on well-formed but invalid XML.

The Service Provider software contains a code path with an uncaught exception that can be triggered by an unauthenticated attacker by supplying well-formed but schema-invalid XML in the form of SAML metadata or SAML protocol messages. The result is a crash and so causes a denial of service.

You must rebuild opensaml and shibboleth with xmltooling-1.5.5 or later. The easiest way to do so is to update the whole chain including shibboleth-2.5.5 an opensaml2.5.5.

Solution

Update the affected packages.

See Also

http://shibboleth.net/community/advisories/secadv_20150721.txt

http://www.nessus.org/u?c5174534

Plugin Details

Severity: Medium

ID: 84995

File Name: freebsd_pkg_b202e4ce311411e5aa320026551a22dc.nasl

Version: 2.4

Type: local

Published: 7/27/2015

Updated: 1/6/2021

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: Low

Score: 3.7

CVSS v2

Risk Factor: Medium

Base Score: 4

Vector: CVSS2#AV:N/AC:L/Au:S/C:N/I:N/A:P

Vulnerability Information

CPE: p-cpe:/a:freebsd:freebsd:opensaml2, p-cpe:/a:freebsd:freebsd:shibboleth-sp, p-cpe:/a:freebsd:freebsd:xmltooling, cpe:/o:freebsd:freebsd

Required KB Items: Host/local_checks_enabled, Host/FreeBSD/release, Host/FreeBSD/pkg_info

Patch Publication Date: 7/23/2015

Vulnerability Publication Date: 7/21/2015

Reference Information

CVE: CVE-2015-2684