Openwall GNU/*/Linux - a small security-enhanced Linux distro for servers
[<prev] [next>] [day] [month] [year] [list]
Date: Mon, 21 Nov 2016 11:58:29 +0100
From: Cedric Buissart <cbuissar@...hat.com>
To: oss-security@...ts.openwall.com
Subject: CVE-2016-8638 ipsilon: DoS via logging out all open SAML2 sessions

Hi,

This is to inform you of the following CVE:

CVE-2016-8638 ipsilon: DoS via logging out all open SAML2 sessions

Description :
A vulnerability in ipsilon was found that allows attacker to log out active
sessions of other users. This issue is related to how it tracks sessions, and
allows an unauthenticated attacker to view and terminate active sessions from
other users.

Note: this bug can also be triggered accidentally.

Upstream patch : 
https://pagure.io/ipsilon/c/511fa8b7001c2f9a42301aa1d4b85aaf170a461c

Vulnerable versions: 
All versions of Ipsilon 2.0 before 2.0.2 are vulnerable.
All versions of Ipsilon 1.2 before 1.2.1 are vulnerable.
All versions of Ipsilon 1.1 before 1.1.2 are vulnerable.
All versions of Ipsilon 1.0 before 1.0.3 are vulnerable.

Impact: Important
CVSS3 scoring : 8.2 AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H

Reported by: Patrick Uiterwijk (Red Hat) and Howard Johnson

Reference :
https://ipsilon-project.org/advisory/CVE-2016-8638.txt

Best Regards,

--
Cedric Buissart
Red Hat Product Security
-----------------------------------------
Download attachment "signature.asc" of type "application/pgp-signature" (474 bytes)

Powered by blists - more mailing lists

Your e-mail address:

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Powered by Openwall GNU/*/Linux - Powered by OpenVZ