5
CVSSv2

CVE-2009-0217

Published: 14/07/2009 Updated: 12/10/2018
CVSS v2 Base Score: 5 | Impact Score: 2.9 | Exploitability Score: 10
VMScore: 445
Vector: AV:N/AC:L/Au:N/C:N/I:P/A:N

Vulnerability Summary

The design of the W3C XML Signature Syntax and Processing (XMLDsig) recommendation, as implemented in products including (1) the Oracle Security Developer Tools component in Oracle Application Server 10.1.2.3, 10.1.3.4, and 10.1.4.3IM; (2) the WebLogic Server component in BEA Product Suite 10.3, 10.0 MP1, 9.2 MP3, 9.1, 9.0, and 8.1 SP6; (3) Mono prior to 2.4.2.2; (4) XML Security Library prior to 1.2.12; (5) IBM WebSphere Application Server Versions 6.0 up to and including 6.0.2.33, 6.1 up to and including 6.1.0.23, and 7.0 up to and including 7.0.0.1; (6) Sun JDK and JRE Update 14 and previous versions; (7) Microsoft .NET Framework 3.0 up to and including 3.0 SP2, 3.5, and 4.0; and other products uses a parameter that defines an HMAC truncation length (HMACOutputLength) but does not require a minimum for this length, which allows malicious users to spoof HMAC-based signatures and bypass authentication by specifying a truncation length with a small number of bits.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

oracle application server 10.1.3.4

oracle application server 10.1.2.3

oracle bea product suite 10.0

mono project mono 2.0

oracle weblogic server component 10.3

oracle weblogic server component 10.0

ibm websphere application server 6.0.2.10

ibm websphere application server 6.0.2.12

ibm websphere application server 6.0.1.1

ibm websphere application server 6.0.1.13

ibm websphere application server 6.0.2.2

ibm websphere application server 6.0.2.19

ibm websphere application server 6.0.2.21

ibm websphere application server 6.0.0.2

ibm websphere application server 6.0.2.29

ibm websphere application server 6.0.2.28

ibm websphere application server 6.0.2.25

ibm websphere application server 6.1.0.20

ibm websphere application server 6.1.0.22

ibm websphere application server 6.1.0.13

ibm websphere application server 6.1.0.14

ibm websphere application server 6.1.0.3

ibm websphere application server 6.1.0.4

ibm websphere application server 7.0.0.1

oracle bea product suite 9.1

oracle bea product suite 9.0

mono project mono 1.2.1

mono project mono 1.9

ibm websphere application server 6.0.1.15

ibm websphere application server 6.0.1.17

ibm websphere application server 6.0.1.5

ibm websphere application server 6.0.1.3

ibm websphere application server 6.0.2.1

ibm websphere application server 6.0.2

ibm websphere application server 6.0.1

ibm websphere application server 6.0.1.2

ibm websphere application server 6.0.2.30

ibm websphere application server 6.0.2.3

ibm websphere application server 6.1.0.19

ibm websphere application server 6.1.0.21

ibm websphere application server 6.1.0.10

ibm websphere application server 6.1.0.15

ibm websphere application server 6.1.0.12

ibm websphere application server 6.1

ibm websphere application server 6.1.0.18

ibm websphere application server 6.1.0.9

ibm websphere application server 7.0

oracle application server 10.1.4.3im

oracle bea product suite 10.3

mono project mono 1.2.6

mono project mono 1.2.3

oracle weblogic server component 9.2

oracle weblogic server component 9.1

ibm websphere application server 6.0.2.14

ibm websphere application server 6.0.2.16

ibm websphere application server 6.0.1.11

ibm websphere application server 6.0.1.9

ibm websphere application server 6.0.1.7

ibm websphere application server 6.0.2.17

ibm websphere application server 6.0.2.15

ibm websphere application server 6.0.0.3

ibm websphere application server 6.0.2.33

ibm websphere application server 6.0.2.24

ibm websphere application server 6.0.2.23

ibm websphere application server 6.1.0.23

ibm websphere application server 6.1.0.1

ibm websphere application server 6.1.0.17

ibm websphere application server 6.1.0.0

ibm websphere application server 6.1.0.5

ibm websphere application server 6.1.0.6

oracle bea product suite 9.2

oracle bea product suite 8.1

mono project mono 1.2.2

mono project mono 1.2.5

mono project mono 1.2.4

oracle weblogic server component 9.0

oracle weblogic server component 8.1

ibm websphere application server 6.0.2.18

ibm websphere application server 6.0.2.20

ibm websphere application server 6.0.2.13

ibm websphere application server 6.0.2.11

ibm websphere application server 6.0

ibm websphere application server 6.0.0.1

ibm websphere application server 6.0.2.32

ibm websphere application server 6.0.2.31

ibm websphere application server 6.0.2.22

ibm websphere application server 6.1.0.16

ibm websphere application server 6.1.0.2

ibm websphere application server 6.1.0

ibm websphere application server 6.1.0.11

ibm websphere application server 6.1.0.7

ibm websphere application server 6.1.0.8

Vendor Advisories

Several vulnerabilities have been discovered in the OpenOfficeorg office suite The Common Vulnerabilities and Exposures project identifies the following problems: CVE-2010-0136 It was discovered that macro security settings were insufficiently enforced for VBA macros CVE-2009-0217 It was discovered that the W3C XML Signature recomme ...
Synopsis Critical: java-160-sun security update Type/Severity Security Advisory: Critical Topic Updated java-160-sun packages that correct several security issues arenow available for Red Hat Enterprise Linux 4 Extras and 5 SupplementaryThis update has been rated as having critical security impact by t ...
Synopsis Important: java-160-openjdk security and bug fix update Type/Severity Security Advisory: Important Topic Updated java-160-openjdk packages that fix several security issues and abug are now available for Red Hat Enterprise Linux 5This update has been rated as having important security impact by ...
Synopsis Critical: java-160-ibm security update Type/Severity Security Advisory: Critical Topic Updated java-160-ibm packages that fix several security issues are nowavailable for Red Hat Enterprise Linux 4 Extras and 5 SupplementaryThis update has been rated as having critical security impact by the R ...
Synopsis Low: Red Hat Network Satellite Server IBM Java Runtime security update Type/Severity Security Advisory: Low Topic Updated java-160-ibm packages that fix several security issues are nowavailable for Red Hat Network Satellite Server 53This update has been rated as having low security impact by th ...
It was discovered that the XML HMAC signature system did not correctly check certain lengths If an attacker sent a truncated HMAC, it could bypass authentication, leading to potential privilege escalation (CVE-2009-0217) ...
It was discovered that the XML HMAC signature system did not correctly check certain lengths If an attacker sent a truncated HMAC, it could bypass authentication, leading to potential privilege escalation (CVE-2009-0217) ...
It was discovered that the XML HMAC signature system did not correctly check certain lengths If an attacker sent a truncated HMAC, it could bypass authentication, leading to potential privilege escalation (CVE-2009-0217) ...

References

NVD-CWE-Otherhttp://www.kb.cert.org/vuls/id/466161http://www.w3.org/2008/06/xmldsigcore-errata.html#e03http://www.w3.org/QA/2009/07/hmac_truncation_in_xml_signatu.htmlhttp://www.aleksey.com/xmlsec/http://www.mono-project.com/Vulnerabilitieshttp://www.vupen.com/english/advisories/2009/1911https://issues.apache.org/bugzilla/show_bug.cgi?id=47527http://www-01.ibm.com/support/docview.wss?rs=180&uid=swg21384925http://www.securitytracker.com/id?1022561http://www-01.ibm.com/support/docview.wss?rs=180&context=SSEQTP&dc=D400&uid=swg24023545&loc=en_US&cs=UTF-8&lang=en&rss=ct180webspherehttp://www-01.ibm.com/support/docview.wss?rs=180&context=SSEQTP&dc=D400&uid=swg24023723&loc=en_US&cs=UTF-8&lang=en&rss=ct180webspherehttp://www.vupen.com/english/advisories/2009/1908http://osvdb.org/55895http://secunia.com/advisories/35776http://www.vupen.com/english/advisories/2009/1900http://osvdb.org/55907http://www.securitytracker.com/id?1022567http://secunia.com/advisories/35855http://secunia.com/advisories/35853http://secunia.com/advisories/35854http://secunia.com/advisories/35858http://www.kb.cert.org/vuls/id/MAPG-7TSKXQhttp://blogs.sun.com/security/entry/cert_vulnerability_note_vu_466161http://www.kb.cert.org/vuls/id/WDON-7TY529http://sunsolve.sun.com/search/document.do?assetkey=1-66-263429-1http://sunsolve.sun.com/search/document.do?assetkey=1-21-125136-16-1http://www.securityfocus.com/bid/35671https://rhn.redhat.com/errata/RHSA-2009-1201.htmlhttps://issues.apache.org/bugzilla/show_bug.cgi?id=47526http://secunia.com/advisories/36180https://rhn.redhat.com/errata/RHSA-2009-1200.htmlhttp://www.vupen.com/english/advisories/2009/1909http://www.securitytracker.com/id?1022661http://secunia.com/advisories/36162http://secunia.com/advisories/35852http://secunia.com/advisories/36176https://www.redhat.com/archives/fedora-package-announce/2009-August/msg00310.htmlhttps://www.redhat.com/archives/fedora-package-announce/2009-August/msg00325.htmlhttps://www.redhat.com/archives/fedora-package-announce/2009-August/msg00494.htmlhttps://www.redhat.com/archives/fedora-package-announce/2009-August/msg00505.htmlhttp://www.mandriva.com/security/advisories?name=MDVSA-2009:209http://secunia.com/advisories/36494http://lists.apple.com/archives/security-announce/2009/Sep/msg00000.htmlhttp://www.vupen.com/english/advisories/2009/2543http://www.us-cert.gov/cas/techalerts/TA09-294A.htmlhttp://www.vupen.com/english/advisories/2009/3122http://lists.opensuse.org/opensuse-security-announce/2009-11/msg00002.htmlhttp://sunsolve.sun.com/search/document.do?assetkey=1-66-269208-1http://marc.info/?l=bugtraq&m=125787273209737&w=2http://secunia.com/advisories/37300http://git.gnome.org/cgit/xmlsec/commit/?id=34b349675af9f72eb822837a8772cc1ead7115c7https://rhn.redhat.com/errata/RHSA-2009-1428.htmlhttp://git.gnome.org/cgit/xmlsec/patch/?id=34b349675af9f72eb822837a8772cc1ead7115c7http://svn.apache.org/viewvc?revision=794013&view=revisionhttps://rhn.redhat.com/errata/RHSA-2009-1649.htmlhttps://rhn.redhat.com/errata/RHSA-2009-1637.htmlhttps://bugzilla.redhat.com/show_bug.cgi?id=511915https://rhn.redhat.com/errata/RHSA-2009-1636.htmlhttp://secunia.com/advisories/37671https://rhn.redhat.com/errata/RHSA-2009-1650.htmlhttp://secunia.com/advisories/37841http://www.redhat.com/support/errata/RHSA-2009-1694.htmlhttp://secunia.com/advisories/38567http://secunia.com/advisories/38568http://www.vupen.com/english/advisories/2010/0366http://www.debian.org/security/2010/dsa-1995http://www.openoffice.org/security/cves/CVE-2009-0217.htmlhttp://secunia.com/advisories/38695http://www.ubuntu.com/usn/USN-903-1http://lists.opensuse.org/opensuse-security-announce/2010-03/msg00005.htmlhttp://secunia.com/advisories/38921http://www.vupen.com/english/advisories/2010/0635http://sunsolve.sun.com/search/document.do?assetkey=1-77-1020710.1-1http://www.us-cert.gov/cas/techalerts/TA10-159B.htmlhttp://www.oracle.com/technetwork/topics/security/cpuoct2010-175626.htmlhttp://www.oracle.com/technetwork/topics/security/cpujul2009-091332.htmlhttp://www.oracle.com/technetwork/topics/security/cpuoct2009-096303.htmlhttp://secunia.com/advisories/34461http://www.gentoo.org/security/en/glsa/glsa-201408-19.xmlhttp://secunia.com/advisories/60799http://secunia.com/advisories/41818https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A8717https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7158https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10186https://usn.ubuntu.com/826-1/https://docs.microsoft.com/en-us/security-updates/securitybulletins/2010/ms10-041https://nvd.nist.govhttps://www.debian.org/security/./dsa-1995https://usn.ubuntu.com/826-1/https://www.kb.cert.org/vuls/id/466161