Skip site navigation (1)Skip section navigation (2)
Date:      Fri, 12 Jan 2018 17:23:33 +0000 (UTC)
From:      Palle Girgensohn <girgen@FreeBSD.org>
To:        ports-committers@freebsd.org, svn-ports-all@freebsd.org, svn-ports-head@freebsd.org
Subject:   svn commit: r458859 - head/security/vuxml
Message-ID:  <201801121723.w0CHNXjW046351@repo.freebsd.org>

next in thread | raw e-mail | index | archive | help
Author: girgen
Date: Fri Jan 12 17:23:33 2018
New Revision: 458859
URL: https://svnweb.freebsd.org/changeset/ports/458859

Log:
  Document vulnerability of devel/xmltooling
  
  security/shibboleth2-sp depends on the xmltooling port
  
  Security:	CVE-2018-0486

Modified:
  head/security/vuxml/vuln.xml

Modified: head/security/vuxml/vuln.xml
==============================================================================
--- head/security/vuxml/vuln.xml	Fri Jan 12 16:43:42 2018	(r458858)
+++ head/security/vuxml/vuln.xml	Fri Jan 12 17:23:33 2018	(r458859)
@@ -58,6 +58,48 @@ Notes:
   * Do not forget port variants (linux-f10-libxml2, libxml2, etc.)
 -->
 <vuxml xmlns="http://www.vuxml.org/apps/vuxml-1">;
+  <vuln vid="3dbe9492-f7b8-11e7-a12d-6cc21735f730">
+   <topic>shibboleth-sp -- vulnerable to forged user attribute data</topic>
+   <affects>
+     <package>
+	<name>xmltooling</name>
+	<range><lt>1.6.3</lt></range>
+     </package>
+   </affects>
+   <description>
+     <body xmlns="http://www.w3.org/1999/xhtml">;
+	<p>Shibboleth consortium reports:</p>
+	<blockquote cite="https://shibboleth.net/community/advisories/secadv_20180112.txt">;
+	  <p>
+	    Shibboleth SP software vulnerable to forged user attribute data
+	  </p>
+	  <p>
+	    The Service Provider software relies on a generic XML parser to
+	    process SAML responses and there are limitations in older versions
+	    of the parser that make it impossible to fully disable Document Type
+	    Definition (DTD) processing.
+	  </p>
+	  <p>
+	    Through addition/manipulation of a DTD, it's possible to make
+	    changes to an XML document that do not break a digital signature but
+	    are mishandled by the SP and its libraries. These manipulations can
+	    alter the user data passed through to applications behind the SP and
+	    result in impersonation attacks and exposure of protected
+	    information.
+	  </p>
+	</blockquote>
+     </body>
+   </description>
+   <references>
+     <url>https://shibboleth.net/community/advisories/secadv_20180112.txt</url>;
+     <cvename>CVE-2018-0486</cvename>
+   </references>
+   <dates>
+     <discovery>2018-01-12</discovery>
+     <entry>2018-01-12</entry>
+   </dates>
+  </vuln>
+
   <vuln vid="9c016563-f582-11e7-b33c-6451062f0f7a">
     <topic>Flash Player -- information disclosure</topic>
     <affects>



Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?201801121723.w0CHNXjW046351>