CVE-2018-0486

NameCVE-2018-0486
DescriptionShibboleth XMLTooling-C before 1.6.3, as used in Shibboleth Service Provider before 2.6.0 on Windows and other products, mishandles digital signatures of user attribute data, which allows remote attackers to obtain sensitive information or conduct impersonation attacks via a crafted DTD.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, bugtraq, EDB, Metasploit, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, Mageia, GitHub code/issues, web search, more)
ReferencesDLA-1242-1, DSA-4085-1

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
xmltooling (PTS)wheezy1.4.2-5+deb7u1vulnerable
wheezy (security)1.4.2-5+deb7u2fixed
jessie1.5.3-2+deb8u1vulnerable
jessie (security)1.5.3-2+deb8u2fixed
stretch1.6.0-4fixed
buster, sid1.6.2-1vulnerable

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
xmltoolingsource(unstable)(unfixed)
xmltoolingsourcejessie1.5.3-2+deb8u2DSA-4085-1
xmltoolingsourcestretch(not affected)
xmltoolingsourcewheezy1.4.2-5+deb7u2DLA-1242-1

Notes

[stretch] - xmltooling <not-affected> (Xerces is configured to disallow DTD use)
https://shibboleth.net/community/advisories/secadv_20180112.txt
Fixed upstream in 1.6.3 to workaround bug independent of if parser already
disallow DTD use.

Search for package or bug name: Reporting problems