Apache Santuario XML Security for C++ (aka xml-security-c) prior to 1.7.1 does not properly validate length values, which allows remote malicious users to cause a denial of service or bypass the CVE-2009-0217 protection mechanism and spoof a signature via crafted length values to the (1) compareBase64StringToRaw, (2) DSIGAlgorithmHandlerDefault, or (3) DSIGAlgorithmHandlerDefault::verify functions.
Vulnerable Product | Search on Vulmon | Subscribe to Product |
---|---|---|
apache xml security for c\\+\\+ 1.6.0 |
||
apache xml security for c\\+\\+ 1.1.0 |
||
apache xml security for c\\+\\+ 1.6.1 |
||
apache xml security for c\\+\\+ 1.2.1 |
||
apache xml security for c\\+\\+ 1.5.1 |
||
apache xml security for c\\+\\+ 1.5.0 |
||
apache xml security for c\\+\\+ 0.2.0 |
||
apache xml security for c\\+\\+ 1.3.0 |
||
apache xml security for c\\+\\+ |
||
apache xml security for c\\+\\+ 1.4.0 |
||
apache xml security for c\\+\\+ 1.3.1 |
||
apache xml security for c\\+\\+ 1.2.0 |
||
apache xml security for c\\+\\+ 0.1.0 |