Bug 971449 (CVE-2013-2155)

Summary: CVE-2013-2155 xml-security-c: DoS and signature bypass in the processing of HMAC output length
Product: [Other] Security Response Reporter: Jan Lieskovsky <jlieskov>
Component: vulnerabilityAssignee: Red Hat Product Security <security-response-team>
Status: CLOSED ERRATA QA Contact:
Severity: medium Docs Contact:
Priority: medium    
Version: unspecifiedCC: security-response-team
Target Milestone: ---Keywords: Security
Target Release: ---   
Hardware: All   
OS: Linux   
Whiteboard:
Fixed In Version: xml-security-c-1.7.1 Doc Type: Bug Fix
Doc Text:
Story Points: ---
Clone Of: Environment:
Last Closed: 2021-10-20 10:38:34 UTC Type: ---
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:
Embargoed:
Bug Depends On: 975304, 975305    
Bug Blocks: 971467    

Description Jan Lieskovsky 2013-06-06 14:36:26 UTC
A security flaw was found in the way HMAC output length processing code of Apache Santuario-C++ (AKA xml-security-c), a C++ language implementation of W3C security standards for XML, processed certain input. A remote attacker could provide a specially-crafted XML file to the application linked against xml-security-c performing HMAC-based XML Signature verification that, when processed would lead to denial of service (that application to consume excessive amount of system resources) or, potentially, signature verification bypass (a possibility forged signature to be considered as valid).

Upstream advisory:
[1] http://santuario.apache.org/secadv.data/CVE-2013-2155.txt

Relevant patch:
[2] http://svn.apache.org/viewvc?view=revision&revision=1493960

Acknowledgements:

Red Hat would like to thank Scott Cantor of Apache Santuario-C++ upstream for reporting of this issue. Upstream acknowledges James Forshaw of Context Information Security as the original issue reporter.

Comment 2 Jan Lieskovsky 2013-06-06 14:38:28 UTC
This issue affects the versions of the xml-security-c package, as shipped with Fedora release of 17 and 18.

--

This issue affects the versions of the xml-security-c package, as shipped with Fedora EPEL-5 and Fedora EPEL-6.

Comment 3 Huzaifa S. Sidhpurwala 2013-06-18 04:19:00 UTC
Public via:

http://santuario.apache.org/secadv.data/CVE-2013-2155.txt

Comment 4 Huzaifa S. Sidhpurwala 2013-06-18 04:23:50 UTC
Created xml-security-c tracking bugs for this issue

Affects: fedora-all [bug 975304]
Affects: epel-all [bug 975305]