Shibboleth Service Provider 3.x before 3.2.2 is prone to a NULL pointer dereference flaw involving the session recovery feature. The flaw is exploitable (for a daemon crash) on systems not using this feature if a crafted cookie is supplied.
References
Link | Resource |
---|---|
https://issues.shibboleth.net/jira/browse/SSPCPP-927 | Exploit Patch Vendor Advisory |
https://bugs.debian.org/987608 | Mailing List Third Party Advisory |
https://git.shibboleth.net/view/?p=cpp-sp.git;a=commit;h=5a47c3b9378f4c49392dd4d15189b70956f9f2ec | Mailing List Vendor Advisory |
https://shibboleth.net/community/advisories/secadv_20210426.txt | Vendor Advisory |
https://www.debian.org/security/2021/dsa-4905 | Third Party Advisory |
Configurations
Information
Published : 2021-04-26 21:15
Updated : 2021-05-07 10:49
NVD link : CVE-2021-31826
Mitre link : CVE-2021-31826
JSON object : View
CWE
CWE-476
NULL Pointer Dereference
Products Affected
shibboleth
- service_provider