5
CVSSv2

CVE-2011-2516

Published: 11/07/2011 Updated: 13/02/2023
CVSS v2 Base Score: 5 | Impact Score: 2.9 | Exploitability Score: 10
VMScore: 445
Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P

Vulnerability Summary

Off-by-one error in the XML signature feature in Apache XML Security for C++ 1.6.0, as used in Shibboleth prior to 2.4.3 and possibly other products, allows remote malicious users to cause a denial of service (crash) via a signature using a large RSA key, which triggers a buffer overflow.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

apache xml security for c\\+\\+ 1.6.0

shibboleth shibboleth-sp 1.3.2

shibboleth shibboleth-sp 1.3.3

shibboleth shibboleth-sp

shibboleth shibboleth-sp 2.4.1

shibboleth shibboleth-sp 1.3.4

shibboleth shibboleth-sp 2.2

shibboleth shibboleth-sp 2.1

shibboleth shibboleth-sp 1.3f

shibboleth shibboleth-sp 2.0

shibboleth shibboleth-sp 2.4

shibboleth shibboleth-sp 2.2.1

shibboleth shibboleth-sp 2.3.1

shibboleth shibboleth-sp 2.3

shibboleth shibboleth-sp 1.3.1

shibboleth shibboleth-sp 1.3.5

Vendor Advisories

Debian Bug report logs - #632973 xml-security-c: CVE-2011-2516: buffer overflows signing or verifying with large keys Package: xml-security-c; Maintainer for xml-security-c is Debian Shib Team <pkg-shibboleth-devel@listsaliothdebianorg>; Reported by: Dominic Hargreaves <dom@earthli> Date: Thu, 7 Jul 2011 14:15:01 ...