Vulnerabilities > CVE-2016-9814 - Resource Management Errors vulnerability in Simplesamlphp
Attack vector
NETWORK Attack complexity
LOW Privileges required
NONE Confidentiality impact
NONE Integrity impact
HIGH Availability impact
HIGH Summary
The validateSignature method in the SAML2\Utils class in SimpleSAMLphp before 1.14.10 and simplesamlphp/saml2 library before 1.9.1, 1.10.x before 1.10.3, and 2.x before 2.3.3 allows remote attackers to spoof SAML responses or possibly cause a denial of service (memory consumption) by leveraging improper conversion of return values to boolean.
Vulnerable Configurations
Common Weakness Enumeration (CWE)
Nessus
NASL family | Debian Local Security Checks |
NASL id | DEBIAN_DLA-1298.NASL |
description | Several vulnerabilities have been discovered in SimpleSAMLphp, a framework for authentication, primarily via the SAML protocol. CVE-2016-9814 & CVE-2016-9955 An incorrect check of return values in the signature validation utilities allowed an attacker to get invalid signatures accepted as valid in the rare case of an error occurring during validation. SSPSA-201802-01 (no CVE yet) Critical signature validation vulnerability. In addition this update adds a patch to solve excessive resource consumption in case of SimpleSAMLphp processing a large metadata file. For Debian 7 |
last seen | 2020-03-17 |
modified | 2018-03-06 |
plugin id | 107133 |
published | 2018-03-06 |
reporter | This script is Copyright (C) 2018-2020 and is owned by Tenable, Inc. or an Affiliate thereof. |
source | https://www.tenable.com/plugins/nessus/107133 |
title | Debian DLA-1298-1 : simplesamlphp security update |
code |
|
References
- http://www.securityfocus.com/bid/94730
- http://www.securityfocus.com/bid/94730
- https://lists.debian.org/debian-lts-announce/2018/03/msg00001.html
- https://lists.debian.org/debian-lts-announce/2018/03/msg00001.html
- https://simplesamlphp.org/security/201612-01
- https://simplesamlphp.org/security/201612-01