mirror of
https://github.com/CVEProject/cvelist.git
synced 2025-07-29 05:56:59 +00:00
493 lines
18 KiB
JSON
493 lines
18 KiB
JSON
{
|
|
"CVE_data_meta" : {
|
|
"ASSIGNER" : "cve@mitre.org",
|
|
"ID" : "CVE-2009-0217",
|
|
"STATE" : "PUBLIC"
|
|
},
|
|
"affects" : {
|
|
"vendor" : {
|
|
"vendor_data" : [
|
|
{
|
|
"product" : {
|
|
"product_data" : [
|
|
{
|
|
"product_name" : "n/a",
|
|
"version" : {
|
|
"version_data" : [
|
|
{
|
|
"version_value" : "n/a"
|
|
}
|
|
]
|
|
}
|
|
}
|
|
]
|
|
},
|
|
"vendor_name" : "n/a"
|
|
}
|
|
]
|
|
}
|
|
},
|
|
"data_format" : "MITRE",
|
|
"data_type" : "CVE",
|
|
"data_version" : "4.0",
|
|
"description" : {
|
|
"description_data" : [
|
|
{
|
|
"lang" : "eng",
|
|
"value" : "The design of the W3C XML Signature Syntax and Processing (XMLDsig) recommendation, as implemented in products including (1) the Oracle Security Developer Tools component in Oracle Application Server 10.1.2.3, 10.1.3.4, and 10.1.4.3IM; (2) the WebLogic Server component in BEA Product Suite 10.3, 10.0 MP1, 9.2 MP3, 9.1, 9.0, and 8.1 SP6; (3) Mono before 2.4.2.2; (4) XML Security Library before 1.2.12; (5) IBM WebSphere Application Server Versions 6.0 through 6.0.2.33, 6.1 through 6.1.0.23, and 7.0 through 7.0.0.1; (6) Sun JDK and JRE Update 14 and earlier; (7) Microsoft .NET Framework 3.0 through 3.0 SP2, 3.5, and 4.0; and other products uses a parameter that defines an HMAC truncation length (HMACOutputLength) but does not require a minimum for this length, which allows attackers to spoof HMAC-based signatures and bypass authentication by specifying a truncation length with a small number of bits."
|
|
}
|
|
]
|
|
},
|
|
"problemtype" : {
|
|
"problemtype_data" : [
|
|
{
|
|
"description" : [
|
|
{
|
|
"lang" : "eng",
|
|
"value" : "n/a"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
},
|
|
"references" : {
|
|
"reference_data" : [
|
|
{
|
|
"name" : "http://www.w3.org/QA/2009/07/hmac_truncation_in_xml_signatu.html",
|
|
"refsource" : "MISC",
|
|
"url" : "http://www.w3.org/QA/2009/07/hmac_truncation_in_xml_signatu.html"
|
|
},
|
|
{
|
|
"name" : "http://www-01.ibm.com/support/docview.wss?rs=180&uid=swg21384925",
|
|
"refsource" : "CONFIRM",
|
|
"url" : "http://www-01.ibm.com/support/docview.wss?rs=180&uid=swg21384925"
|
|
},
|
|
{
|
|
"name" : "http://www.aleksey.com/xmlsec/",
|
|
"refsource" : "CONFIRM",
|
|
"url" : "http://www.aleksey.com/xmlsec/"
|
|
},
|
|
{
|
|
"name" : "http://www.mono-project.com/Vulnerabilities",
|
|
"refsource" : "CONFIRM",
|
|
"url" : "http://www.mono-project.com/Vulnerabilities"
|
|
},
|
|
{
|
|
"name" : "http://www.oracle.com/technetwork/topics/security/cpujul2009-091332.html",
|
|
"refsource" : "CONFIRM",
|
|
"url" : "http://www.oracle.com/technetwork/topics/security/cpujul2009-091332.html"
|
|
},
|
|
{
|
|
"name" : "http://www.w3.org/2008/06/xmldsigcore-errata.html#e03",
|
|
"refsource" : "CONFIRM",
|
|
"url" : "http://www.w3.org/2008/06/xmldsigcore-errata.html#e03"
|
|
},
|
|
{
|
|
"name" : "https://issues.apache.org/bugzilla/show_bug.cgi?id=47527",
|
|
"refsource" : "CONFIRM",
|
|
"url" : "https://issues.apache.org/bugzilla/show_bug.cgi?id=47527"
|
|
},
|
|
{
|
|
"name" : "http://www.kb.cert.org/vuls/id/MAPG-7TSKXQ",
|
|
"refsource" : "CONFIRM",
|
|
"url" : "http://www.kb.cert.org/vuls/id/MAPG-7TSKXQ"
|
|
},
|
|
{
|
|
"name" : "http://sunsolve.sun.com/search/document.do?assetkey=1-21-125136-16-1",
|
|
"refsource" : "CONFIRM",
|
|
"url" : "http://sunsolve.sun.com/search/document.do?assetkey=1-21-125136-16-1"
|
|
},
|
|
{
|
|
"name" : "http://blogs.sun.com/security/entry/cert_vulnerability_note_vu_466161",
|
|
"refsource" : "CONFIRM",
|
|
"url" : "http://blogs.sun.com/security/entry/cert_vulnerability_note_vu_466161"
|
|
},
|
|
{
|
|
"name" : "http://www.kb.cert.org/vuls/id/WDON-7TY529",
|
|
"refsource" : "CONFIRM",
|
|
"url" : "http://www.kb.cert.org/vuls/id/WDON-7TY529"
|
|
},
|
|
{
|
|
"name" : "https://issues.apache.org/bugzilla/show_bug.cgi?id=47526",
|
|
"refsource" : "CONFIRM",
|
|
"url" : "https://issues.apache.org/bugzilla/show_bug.cgi?id=47526"
|
|
},
|
|
{
|
|
"name" : "http://www.oracle.com/technetwork/topics/security/cpuoct2009-096303.html",
|
|
"refsource" : "CONFIRM",
|
|
"url" : "http://www.oracle.com/technetwork/topics/security/cpuoct2009-096303.html"
|
|
},
|
|
{
|
|
"name" : "http://git.gnome.org/cgit/xmlsec/commit/?id=34b349675af9f72eb822837a8772cc1ead7115c7",
|
|
"refsource" : "CONFIRM",
|
|
"url" : "http://git.gnome.org/cgit/xmlsec/commit/?id=34b349675af9f72eb822837a8772cc1ead7115c7"
|
|
},
|
|
{
|
|
"name" : "http://git.gnome.org/cgit/xmlsec/patch/?id=34b349675af9f72eb822837a8772cc1ead7115c7",
|
|
"refsource" : "CONFIRM",
|
|
"url" : "http://git.gnome.org/cgit/xmlsec/patch/?id=34b349675af9f72eb822837a8772cc1ead7115c7"
|
|
},
|
|
{
|
|
"name" : "http://svn.apache.org/viewvc?revision=794013&view=revision",
|
|
"refsource" : "CONFIRM",
|
|
"url" : "http://svn.apache.org/viewvc?revision=794013&view=revision"
|
|
},
|
|
{
|
|
"name" : "https://bugzilla.redhat.com/show_bug.cgi?id=511915",
|
|
"refsource" : "CONFIRM",
|
|
"url" : "https://bugzilla.redhat.com/show_bug.cgi?id=511915"
|
|
},
|
|
{
|
|
"name" : "http://www.openoffice.org/security/cves/CVE-2009-0217.html",
|
|
"refsource" : "CONFIRM",
|
|
"url" : "http://www.openoffice.org/security/cves/CVE-2009-0217.html"
|
|
},
|
|
{
|
|
"name" : "http://www.oracle.com/technetwork/topics/security/cpuoct2010-175626.html",
|
|
"refsource" : "CONFIRM",
|
|
"url" : "http://www.oracle.com/technetwork/topics/security/cpuoct2010-175626.html"
|
|
},
|
|
{
|
|
"name" : "PK80596",
|
|
"refsource" : "AIXAPAR",
|
|
"url" : "http://www-01.ibm.com/support/docview.wss?rs=180&context=SSEQTP&dc=D400&uid=swg24023545&loc=en_US&cs=UTF-8&lang=en&rss=ct180websphere"
|
|
},
|
|
{
|
|
"name" : "PK80627",
|
|
"refsource" : "AIXAPAR",
|
|
"url" : "http://www-01.ibm.com/support/docview.wss?rs=180&context=SSEQTP&dc=D400&uid=swg24023723&loc=en_US&cs=UTF-8&lang=en&rss=ct180websphere"
|
|
},
|
|
{
|
|
"name" : "APPLE-SA-2009-09-03-1",
|
|
"refsource" : "APPLE",
|
|
"url" : "http://lists.apple.com/archives/security-announce/2009/Sep/msg00000.html"
|
|
},
|
|
{
|
|
"name" : "DSA-1995",
|
|
"refsource" : "DEBIAN",
|
|
"url" : "http://www.debian.org/security/2010/dsa-1995"
|
|
},
|
|
{
|
|
"name" : "FEDORA-2009-8329",
|
|
"refsource" : "FEDORA",
|
|
"url" : "https://www.redhat.com/archives/fedora-package-announce/2009-August/msg00310.html"
|
|
},
|
|
{
|
|
"name" : "FEDORA-2009-8337",
|
|
"refsource" : "FEDORA",
|
|
"url" : "https://www.redhat.com/archives/fedora-package-announce/2009-August/msg00325.html"
|
|
},
|
|
{
|
|
"name" : "FEDORA-2009-8456",
|
|
"refsource" : "FEDORA",
|
|
"url" : "https://www.redhat.com/archives/fedora-package-announce/2009-August/msg00494.html"
|
|
},
|
|
{
|
|
"name" : "FEDORA-2009-8473",
|
|
"refsource" : "FEDORA",
|
|
"url" : "https://www.redhat.com/archives/fedora-package-announce/2009-August/msg00505.html"
|
|
},
|
|
{
|
|
"name" : "GLSA-201408-19",
|
|
"refsource" : "GENTOO",
|
|
"url" : "http://www.gentoo.org/security/en/glsa/glsa-201408-19.xml"
|
|
},
|
|
{
|
|
"name" : "HPSBUX02476",
|
|
"refsource" : "HP",
|
|
"url" : "http://marc.info/?l=bugtraq&m=125787273209737&w=2"
|
|
},
|
|
{
|
|
"name" : "SSRT090250",
|
|
"refsource" : "HP",
|
|
"url" : "http://marc.info/?l=bugtraq&m=125787273209737&w=2"
|
|
},
|
|
{
|
|
"name" : "MDVSA-2009:209",
|
|
"refsource" : "MANDRIVA",
|
|
"url" : "http://www.mandriva.com/security/advisories?name=MDVSA-2009:209"
|
|
},
|
|
{
|
|
"name" : "MS10-041",
|
|
"refsource" : "MS",
|
|
"url" : "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2010/ms10-041"
|
|
},
|
|
{
|
|
"name" : "RHSA-2009:1200",
|
|
"refsource" : "REDHAT",
|
|
"url" : "https://rhn.redhat.com/errata/RHSA-2009-1200.html"
|
|
},
|
|
{
|
|
"name" : "RHSA-2009:1201",
|
|
"refsource" : "REDHAT",
|
|
"url" : "https://rhn.redhat.com/errata/RHSA-2009-1201.html"
|
|
},
|
|
{
|
|
"name" : "RHSA-2009:1428",
|
|
"refsource" : "REDHAT",
|
|
"url" : "https://rhn.redhat.com/errata/RHSA-2009-1428.html"
|
|
},
|
|
{
|
|
"name" : "RHSA-2009:1636",
|
|
"refsource" : "REDHAT",
|
|
"url" : "https://rhn.redhat.com/errata/RHSA-2009-1636.html"
|
|
},
|
|
{
|
|
"name" : "RHSA-2009:1637",
|
|
"refsource" : "REDHAT",
|
|
"url" : "https://rhn.redhat.com/errata/RHSA-2009-1637.html"
|
|
},
|
|
{
|
|
"name" : "RHSA-2009:1649",
|
|
"refsource" : "REDHAT",
|
|
"url" : "https://rhn.redhat.com/errata/RHSA-2009-1649.html"
|
|
},
|
|
{
|
|
"name" : "RHSA-2009:1650",
|
|
"refsource" : "REDHAT",
|
|
"url" : "https://rhn.redhat.com/errata/RHSA-2009-1650.html"
|
|
},
|
|
{
|
|
"name" : "RHSA-2009:1694",
|
|
"refsource" : "REDHAT",
|
|
"url" : "http://www.redhat.com/support/errata/RHSA-2009-1694.html"
|
|
},
|
|
{
|
|
"name" : "263429",
|
|
"refsource" : "SUNALERT",
|
|
"url" : "http://sunsolve.sun.com/search/document.do?assetkey=1-66-263429-1"
|
|
},
|
|
{
|
|
"name" : "269208",
|
|
"refsource" : "SUNALERT",
|
|
"url" : "http://sunsolve.sun.com/search/document.do?assetkey=1-66-269208-1"
|
|
},
|
|
{
|
|
"name" : "1020710",
|
|
"refsource" : "SUNALERT",
|
|
"url" : "http://sunsolve.sun.com/search/document.do?assetkey=1-77-1020710.1-1"
|
|
},
|
|
{
|
|
"name" : "SUSE-SA:2009:053",
|
|
"refsource" : "SUSE",
|
|
"url" : "http://lists.opensuse.org/opensuse-security-announce/2009-11/msg00002.html"
|
|
},
|
|
{
|
|
"name" : "SUSE-SA:2010:017",
|
|
"refsource" : "SUSE",
|
|
"url" : "http://lists.opensuse.org/opensuse-security-announce/2010-03/msg00005.html"
|
|
},
|
|
{
|
|
"name" : "USN-826-1",
|
|
"refsource" : "UBUNTU",
|
|
"url" : "https://usn.ubuntu.com/826-1/"
|
|
},
|
|
{
|
|
"name" : "USN-903-1",
|
|
"refsource" : "UBUNTU",
|
|
"url" : "http://www.ubuntu.com/usn/USN-903-1"
|
|
},
|
|
{
|
|
"name" : "TA09-294A",
|
|
"refsource" : "CERT",
|
|
"url" : "http://www.us-cert.gov/cas/techalerts/TA09-294A.html"
|
|
},
|
|
{
|
|
"name" : "TA10-159B",
|
|
"refsource" : "CERT",
|
|
"url" : "http://www.us-cert.gov/cas/techalerts/TA10-159B.html"
|
|
},
|
|
{
|
|
"name" : "VU#466161",
|
|
"refsource" : "CERT-VN",
|
|
"url" : "http://www.kb.cert.org/vuls/id/466161"
|
|
},
|
|
{
|
|
"name" : "35671",
|
|
"refsource" : "BID",
|
|
"url" : "http://www.securityfocus.com/bid/35671"
|
|
},
|
|
{
|
|
"name" : "55895",
|
|
"refsource" : "OSVDB",
|
|
"url" : "http://osvdb.org/55895"
|
|
},
|
|
{
|
|
"name" : "55907",
|
|
"refsource" : "OSVDB",
|
|
"url" : "http://osvdb.org/55907"
|
|
},
|
|
{
|
|
"name" : "oval:org.mitre.oval:def:10186",
|
|
"refsource" : "OVAL",
|
|
"url" : "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10186"
|
|
},
|
|
{
|
|
"name" : "oval:org.mitre.oval:def:7158",
|
|
"refsource" : "OVAL",
|
|
"url" : "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7158"
|
|
},
|
|
{
|
|
"name" : "oval:org.mitre.oval:def:8717",
|
|
"refsource" : "OVAL",
|
|
"url" : "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A8717"
|
|
},
|
|
{
|
|
"name" : "1022561",
|
|
"refsource" : "SECTRACK",
|
|
"url" : "http://www.securitytracker.com/id?1022561"
|
|
},
|
|
{
|
|
"name" : "1022567",
|
|
"refsource" : "SECTRACK",
|
|
"url" : "http://www.securitytracker.com/id?1022567"
|
|
},
|
|
{
|
|
"name" : "1022661",
|
|
"refsource" : "SECTRACK",
|
|
"url" : "http://www.securitytracker.com/id?1022661"
|
|
},
|
|
{
|
|
"name" : "35776",
|
|
"refsource" : "SECUNIA",
|
|
"url" : "http://secunia.com/advisories/35776"
|
|
},
|
|
{
|
|
"name" : "35853",
|
|
"refsource" : "SECUNIA",
|
|
"url" : "http://secunia.com/advisories/35853"
|
|
},
|
|
{
|
|
"name" : "35854",
|
|
"refsource" : "SECUNIA",
|
|
"url" : "http://secunia.com/advisories/35854"
|
|
},
|
|
{
|
|
"name" : "35855",
|
|
"refsource" : "SECUNIA",
|
|
"url" : "http://secunia.com/advisories/35855"
|
|
},
|
|
{
|
|
"name" : "35858",
|
|
"refsource" : "SECUNIA",
|
|
"url" : "http://secunia.com/advisories/35858"
|
|
},
|
|
{
|
|
"name" : "36162",
|
|
"refsource" : "SECUNIA",
|
|
"url" : "http://secunia.com/advisories/36162"
|
|
},
|
|
{
|
|
"name" : "36176",
|
|
"refsource" : "SECUNIA",
|
|
"url" : "http://secunia.com/advisories/36176"
|
|
},
|
|
{
|
|
"name" : "36180",
|
|
"refsource" : "SECUNIA",
|
|
"url" : "http://secunia.com/advisories/36180"
|
|
},
|
|
{
|
|
"name" : "35852",
|
|
"refsource" : "SECUNIA",
|
|
"url" : "http://secunia.com/advisories/35852"
|
|
},
|
|
{
|
|
"name" : "36494",
|
|
"refsource" : "SECUNIA",
|
|
"url" : "http://secunia.com/advisories/36494"
|
|
},
|
|
{
|
|
"name" : "37300",
|
|
"refsource" : "SECUNIA",
|
|
"url" : "http://secunia.com/advisories/37300"
|
|
},
|
|
{
|
|
"name" : "37671",
|
|
"refsource" : "SECUNIA",
|
|
"url" : "http://secunia.com/advisories/37671"
|
|
},
|
|
{
|
|
"name" : "37841",
|
|
"refsource" : "SECUNIA",
|
|
"url" : "http://secunia.com/advisories/37841"
|
|
},
|
|
{
|
|
"name" : "38567",
|
|
"refsource" : "SECUNIA",
|
|
"url" : "http://secunia.com/advisories/38567"
|
|
},
|
|
{
|
|
"name" : "38568",
|
|
"refsource" : "SECUNIA",
|
|
"url" : "http://secunia.com/advisories/38568"
|
|
},
|
|
{
|
|
"name" : "38695",
|
|
"refsource" : "SECUNIA",
|
|
"url" : "http://secunia.com/advisories/38695"
|
|
},
|
|
{
|
|
"name" : "38921",
|
|
"refsource" : "SECUNIA",
|
|
"url" : "http://secunia.com/advisories/38921"
|
|
},
|
|
{
|
|
"name" : "34461",
|
|
"refsource" : "SECUNIA",
|
|
"url" : "http://secunia.com/advisories/34461"
|
|
},
|
|
{
|
|
"name" : "60799",
|
|
"refsource" : "SECUNIA",
|
|
"url" : "http://secunia.com/advisories/60799"
|
|
},
|
|
{
|
|
"name" : "41818",
|
|
"refsource" : "SECUNIA",
|
|
"url" : "http://secunia.com/advisories/41818"
|
|
},
|
|
{
|
|
"name" : "ADV-2009-1900",
|
|
"refsource" : "VUPEN",
|
|
"url" : "http://www.vupen.com/english/advisories/2009/1900"
|
|
},
|
|
{
|
|
"name" : "ADV-2009-1908",
|
|
"refsource" : "VUPEN",
|
|
"url" : "http://www.vupen.com/english/advisories/2009/1908"
|
|
},
|
|
{
|
|
"name" : "ADV-2009-1911",
|
|
"refsource" : "VUPEN",
|
|
"url" : "http://www.vupen.com/english/advisories/2009/1911"
|
|
},
|
|
{
|
|
"name" : "ADV-2009-1909",
|
|
"refsource" : "VUPEN",
|
|
"url" : "http://www.vupen.com/english/advisories/2009/1909"
|
|
},
|
|
{
|
|
"name" : "ADV-2009-2543",
|
|
"refsource" : "VUPEN",
|
|
"url" : "http://www.vupen.com/english/advisories/2009/2543"
|
|
},
|
|
{
|
|
"name" : "ADV-2009-3122",
|
|
"refsource" : "VUPEN",
|
|
"url" : "http://www.vupen.com/english/advisories/2009/3122"
|
|
},
|
|
{
|
|
"name" : "ADV-2010-0366",
|
|
"refsource" : "VUPEN",
|
|
"url" : "http://www.vupen.com/english/advisories/2010/0366"
|
|
},
|
|
{
|
|
"name" : "ADV-2010-0635",
|
|
"refsource" : "VUPEN",
|
|
"url" : "http://www.vupen.com/english/advisories/2010/0635"
|
|
}
|
|
]
|
|
}
|
|
}
|