5.8
CVSSv2

CVE-2013-2155

Published: 20/08/2013 Updated: 07/11/2023
CVSS v2 Base Score: 5.8 | Impact Score: 4.9 | Exploitability Score: 8.6
VMScore: 516
Vector: AV:N/AC:M/Au:N/C:N/I:P/A:P

Vulnerability Summary

Apache Santuario XML Security for C++ (aka xml-security-c) prior to 1.7.1 does not properly validate length values, which allows remote malicious users to cause a denial of service or bypass the CVE-2009-0217 protection mechanism and spoof a signature via crafted length values to the (1) compareBase64StringToRaw, (2) DSIGAlgorithmHandlerDefault, or (3) DSIGAlgorithmHandlerDefault::verify functions.

Vulnerable Product Search on Vulmon Subscribe to Product

apache xml security for c\\+\\+ 1.6.0

apache xml security for c\\+\\+ 1.1.0

apache xml security for c\\+\\+ 1.6.1

apache xml security for c\\+\\+ 1.2.1

apache xml security for c\\+\\+ 1.5.1

apache xml security for c\\+\\+ 1.5.0

apache xml security for c\\+\\+ 0.2.0

apache xml security for c\\+\\+ 1.3.0

apache xml security for c\\+\\+

apache xml security for c\\+\\+ 1.4.0

apache xml security for c\\+\\+ 1.3.1

apache xml security for c\\+\\+ 1.2.0

apache xml security for c\\+\\+ 0.1.0

Vendor Advisories

James Forshaw from Context Information Security discovered several vulnerabilities in xml-security-c, an implementation of the XML Digital Security specification The Common Vulnerabilities and Exposures project identifies the following problems: CVE-2013-2153 The implementation of XML digital signatures in the Santuario-C++ library is vul ...