A security flaw was found in the way HMAC output length processing code of Apache Santuario-C++ (AKA xml-security-c), a C++ language implementation of W3C security standards for XML, processed certain input. A remote attacker could provide a specially-crafted XML file to the application linked against xml-security-c performing HMAC-based XML Signature verification that, when processed would lead to denial of service (that application to consume excessive amount of system resources) or, potentially, signature verification bypass (a possibility forged signature to be considered as valid). Upstream advisory: [1] http://santuario.apache.org/secadv.data/CVE-2013-2155.txt Relevant patch: [2] http://svn.apache.org/viewvc?view=revision&revision=1493960 Acknowledgements: Red Hat would like to thank Scott Cantor of Apache Santuario-C++ upstream for reporting of this issue. Upstream acknowledges James Forshaw of Context Information Security as the original issue reporter.
This issue affects the versions of the xml-security-c package, as shipped with Fedora release of 17 and 18. -- This issue affects the versions of the xml-security-c package, as shipped with Fedora EPEL-5 and Fedora EPEL-6.
Public via: http://santuario.apache.org/secadv.data/CVE-2013-2155.txt
Created xml-security-c tracking bugs for this issue Affects: fedora-all [bug 975304] Affects: epel-all [bug 975305]