Off-by-one error in the XML signature feature in Apache XML Security for C++ 1.6.0, as used in Shibboleth before 2.4.3 and possibly other products, allows remote attackers to cause a denial of service (crash) via a signature using a large RSA key, which triggers a buffer overflow.
| Software | From | Fixed in |
|---|---|---|
| apache / xml_security_for_c++ | 1.6.0 | 1.6.0.x |
| shibboleth / shibboleth-sp | 1.3.2 | 1.3.2.x |
| shibboleth / shibboleth-sp | 1.3.3 | 1.3.3.x |
| shibboleth / shibboleth-sp | - | 2.4.2.x |
| shibboleth / shibboleth-sp | 2.4.1 | 2.4.1.x |
| shibboleth / shibboleth-sp | 1.3.4 | 1.3.4.x |
| shibboleth / shibboleth-sp | 2.2 | 2.2.x |
| shibboleth / shibboleth-sp | 2.1 | 2.1.x |
| shibboleth / shibboleth-sp | 1.3f | 1.3f.x |
| shibboleth / shibboleth-sp | 2.0 | 2.0.x |
| shibboleth / shibboleth-sp | 2.4 | 2.4.x |
| shibboleth / shibboleth-sp | 2.2.1 | 2.2.1.x |
| shibboleth / shibboleth-sp | 2.3.1 | 2.3.1.x |
| shibboleth / shibboleth-sp | 2.3 | 2.3.x |
| shibboleth / shibboleth-sp | 1.3.1 | 1.3.1.x |
| shibboleth / shibboleth-sp | 1.3.5 | 1.3.5.x |