CVE-2018-0486

NameCVE-2018-0486
DescriptionShibboleth XMLTooling-C before 1.6.3, as used in Shibboleth Service Provider before 2.6.0 on Windows and other products, mishandles digital signatures of user attribute data, which allows remote attackers to obtain sensitive information or conduct impersonation attacks via a crafted DTD.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, bugtraq, EDB, Metasploit, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, Mageia, GitHub code/issues, web search, more)
ReferencesDLA-1242-1, DSA-4085-1
NVD severitymedium (attack range: remote)

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
xmltooling (PTS)jessie (security), jessie1.5.3-2+deb8u3fixed
stretch (security), stretch1.6.0-4+deb9u1fixed
sid1.6.4-1fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
xmltoolingsource(unstable)1.6.3-1medium
xmltoolingsourcejessie1.5.3-2+deb8u2mediumDSA-4085-1
xmltoolingsourcestretch1.6.0-4+deb9u1medium
xmltoolingsourcewheezy1.4.2-5+deb7u2mediumDLA-1242-1

Notes

https://shibboleth.net/community/advisories/secadv_20180112.txt
Fixed upstream in 1.6.3 to workaround bug independent of if parser already
disallow DTD use.
https://issues.shibboleth.net/jira/browse/CPPXT-127
https://git.shibboleth.net/view/?p=cpp-xmltooling.git;a=commit;h=a02314e96d6746d29c5697b504d37f2e04a6e6cd

Search for package or bug name: Reporting problems