Red Hat Bugzilla – Bug 971449
CVE-2013-2155 xml-security-c: DoS and signature bypass in the processing of HMAC output length
Last modified: 2015-11-03 23:52:35 EST
A security flaw was found in the way HMAC output length processing code of Apache Santuario-C++ (AKA xml-security-c), a C++ language implementation of W3C security standards for XML, processed certain input. A remote attacker could provide a specially-crafted XML file to the application linked against xml-security-c performing HMAC-based XML Signature verification that, when processed would lead to denial of service (that application to consume excessive amount of system resources) or, potentially, signature verification bypass (a possibility forged signature to be considered as valid).
Red Hat would like to thank Scott Cantor of Apache Santuario-C++ upstream for reporting of this issue. Upstream acknowledges James Forshaw of Context Information Security as the original issue reporter.
This issue affects the versions of the xml-security-c package, as shipped with Fedora release of 17 and 18.
This issue affects the versions of the xml-security-c package, as shipped with Fedora EPEL-5 and Fedora EPEL-6.
Created xml-security-c tracking bugs for this issue
Affects: fedora-all [bug 975304]
Affects: epel-all [bug 975305]