FreeBSD : shibboleth-sp -- DoS vulnerability (b202e4ce-3114-11e5-aa32-0026551a22dc)

Medium Nessus Plugin ID 84995


The remote FreeBSD host is missing one or more security-related updates.


Shibboleth consortium reports :

Shibboleth SP software crashes on well-formed but invalid XML.

The Service Provider software contains a code path with an uncaught exception that can be triggered by an unauthenticated attacker by supplying well-formed but schema-invalid XML in the form of SAML metadata or SAML protocol messages. The result is a crash and so causes a denial of service.

You must rebuild opensaml and shibboleth with xmltooling-1.5.5 or later. The easiest way to do so is to update the whole chain including shibboleth-2.5.5 an opensaml2.5.5.


Update the affected packages.

See Also

Plugin Details

Severity: Medium

ID: 84995

File Name: freebsd_pkg_b202e4ce311411e5aa320026551a22dc.nasl

Version: $Revision: 2.1 $

Type: local

Published: 2015/07/27

Modified: 2015/07/27

Dependencies: 12634

Risk Information

Risk Factor: Medium


Base Score: 4

Vector: CVSS2#AV:N/AC:L/Au:S/C:N/I:N/A:P

Vulnerability Information

CPE: p-cpe:/a:freebsd:freebsd:opensaml2, p-cpe:/a:freebsd:freebsd:shibboleth-sp, p-cpe:/a:freebsd:freebsd:xmltooling, cpe:/o:freebsd:freebsd

Required KB Items: Host/local_checks_enabled, Host/FreeBSD/release, Host/FreeBSD/pkg_info

Patch Publication Date: 2015/07/23

Vulnerability Publication Date: 2015/07/21

Reference Information

CVE: CVE-2015-2684