Apache Santuario XML Security for C++ (aka xml-security-c) before 1.7.1 does not properly validate length values, which allows remote attackers to cause a denial of service or bypass the CVE-2009-0217 protection mechanism and spoof a signature via crafted length values to the (1) compareBase64StringToRaw, (2) DSIGAlgorithmHandlerDefault, or (3) DSIGAlgorithmHandlerDefault::verify functions.
References
Configurations
Configuration 1 (hide)
|
Information
Published : 2013-08-20 15:55
Updated : 2021-09-17 04:15
NVD link : CVE-2013-2155
Mitre link : CVE-2013-2155
JSON object : View
CWE
CWE-20
Improper Input Validation
Products Affected
apache
- xml_security_for_c\+\+