Apache XML Security Multiple Vulnerabilities
Last Update Date:
19 Jun 2013 10:16
Release Date:
19 Jun 2013
3896
Views
RISK: Medium Risk
TYPE: Servers - Web Servers
Multiple vulnerabilities have been identified in Apache XML Security, which can be exploited by malicious people to conduct spoofing attacks, cause a DoS (Denial of Service), and compromise an application using the library.
- An error when processing certain XPointer expressions within the XML Signature Reference processing code can be exploited to cause a stack-based buffer overflow.
- An error when processing the length of HMAC-based XML signatures can be exploited to cause a crash.
- Another error when processing HMAC-based XML signatures can be exploited to spoof XML data.
Note: This vulnerability is caused due to the incomplete fix for CVE-2009-0217. - An error when processing PrefixList attributes can be exploited to cause a heap-based buffer overflow.
Successful exploitation of the vulnerabilities #1 and #4 may allow execution of arbitrary code.
Impact
- Denial of Service
- Spoofing
System / Technologies affected
- versions prior to 1.7.1
Solutions
Before installation of the software, please visit the software manufacturer web-site for more details.
- Update to version 1.7.1
Vulnerability Identifier
Source
Related Link
Share with