FreshPorts - VuXML

This page displays vulnerability information about FreeBSD Ports.

The VUXML data was last processed by FreshPorts on 2024-04-25 11:22:49 UTC

List all Vulnerabilities, by package

List all Vulnerabilities, by date

k68

These are the vulnerabilities relating to the commit you have selected:

VuXML IDDescription
4f8665d0-0465-11e9-b77a-6cc21735f730shibboleth-sp -- crashes on malformed date/time content

The Shibboleth Consortium reports:

SAML messages, assertions, and metadata all commonly contain date/time information in a standard XML format.

Invalid formatted data in such fields cause an exception of a type that was not handled properly in the V3 software and causes a crash (usually to the shibd daemon process, but possibly to Apache in rare cases). Note that the crash occurs prior to evaluation of a message's authenticity, so can be exploited by an untrusted attacker.

The problem is believed to be specific to the V3 software and would not cause a crash in the older, now unsupported, V2 software.


Discovery 2018-12-19
Entry 2018-12-20
shibboleth-sp
ge 3.0.0 lt 3.0.3

https://shibboleth.net/community/advisories/secadv_20181219a.txt
b202e4ce-3114-11e5-aa32-0026551a22dcshibboleth-sp -- DoS vulnerability

Shibboleth consortium reports:

Shibboleth SP software crashes on well-formed but invalid XML.

The Service Provider software contains a code path with an uncaught exception that can be triggered by an unauthenticated attacker by supplying well-formed but schema-invalid XML in the form of SAML metadata or SAML protocol messages. The result is a crash and so causes a denial of service.

You must rebuild opensaml and shibboleth with xmltooling-1.5.5 or later. The easiest way to do so is to update the whole chain including shibboleth-2.5.5 an opensaml2.5.5.


Discovery 2015-07-21
Entry 2015-07-23
xmltooling
< 1.5.5

opensaml2
< 2.5.5

shibboleth-sp
< 2.5.5

http://shibboleth.net/community/advisories/secadv_20150721.txt
CVE-2015-2684
e4403051-a667-11eb-b9c9-6cc21735f730sbibboleth-sp -- denial of service vulnerability

Shibboleth project reports:

Session recovery feature contains a null pointer deference.

The cookie-based session recovery feature added in V3.0 contains a flaw that is exploitable on systems *not* using the feature if a specially crafted cookie is supplied.

This manifests as a crash in the shibd daemon/service process.

Because it is very simple to trigger this condition remotely, it results in a potential denial of service condition exploitable by a remote, unauthenticated attacker.


Discovery 2021-04-23
Entry 2021-04-26
shibboleth-sp
ge 3.0.0 lt 3.2.1_1

https://shibboleth.net/community/advisories/secadv_20210426.txt