Date: Mon, 21 Nov 2016 11:58:29 +0100 From: Cedric Buissart <cbuissar@...hat.com> To: oss-security@...ts.openwall.com Subject: CVE-2016-8638 ipsilon: DoS via logging out all open SAML2 sessions Hi, This is to inform you of the following CVE: CVE-2016-8638 ipsilon: DoS via logging out all open SAML2 sessions Description : A vulnerability in ipsilon was found that allows attacker to log out active sessions of other users. This issue is related to how it tracks sessions, and allows an unauthenticated attacker to view and terminate active sessions from other users. Note: this bug can also be triggered accidentally. Upstream patch : https://pagure.io/ipsilon/c/511fa8b7001c2f9a42301aa1d4b85aaf170a461c Vulnerable versions: All versions of Ipsilon 2.0 before 2.0.2 are vulnerable. All versions of Ipsilon 1.2 before 1.2.1 are vulnerable. All versions of Ipsilon 1.1 before 1.1.2 are vulnerable. All versions of Ipsilon 1.0 before 1.0.3 are vulnerable. Impact: Important CVSS3 scoring : 8.2 AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H Reported by: Patrick Uiterwijk (Red Hat) and Howard Johnson Reference : https://ipsilon-project.org/advisory/CVE-2016-8638.txt Best Regards, -- Cedric Buissart Red Hat Product Security ----------------------------------------- [ CONTENT OF TYPE application/pgp-signature SKIPPED ]
Powered by blists - more mailing lists
Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.
Powered by Openwall GNU/*/Linux - Powered by OpenVZ