Name | CVE-2018-0486 |
Description | Shibboleth XMLTooling-C before 1.6.3, as used in Shibboleth Service Provider before 2.6.0 on Windows and other products, mishandles digital signatures of user attribute data, which allows remote attackers to obtain sensitive information or conduct impersonation attacks via a crafted DTD. |
Source | CVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more) |
References | DLA-1242-1, DSA-4085-1 |
Vulnerable and fixed packages
The table below lists information on source packages.
Source Package | Release | Version | Status |
---|
xmltooling (PTS) | jessie, jessie (lts) | 1.5.3-2+deb8u5 | fixed |
| stretch (security), stretch (lts), stretch | 1.6.0-4+deb9u2 | fixed |
| buster (security), buster, buster (lts) | 3.0.4-1+deb10u2 | fixed |
| bullseye (security), bullseye | 3.2.0-3+deb11u1 | fixed |
| bookworm (security), bookworm | 3.2.3-1+deb12u1 | fixed |
| sid, trixie | 3.2.4-2.1 | fixed |
The information below is based on the following data on fixed versions.
Notes
https://shibboleth.net/community/advisories/secadv_20180112.txt
Fixed upstream in 1.6.3 to workaround bug independent of if parser already
disallow DTD use.
https://issues.shibboleth.net/jira/browse/CPPXT-127
https://git.shibboleth.net/view/?p=cpp-xmltooling.git;a=commit;h=a02314e96d6746d29c5697b504d37f2e04a6e6cd