|
Message-ID: <1935548.nJNUl5RvF6@cbuissar-ltop>
Date: Mon, 21 Nov 2016 11:58:29 +0100
From: Cedric Buissart <cbuissar@...hat.com>
To: oss-security@...ts.openwall.com
Subject: CVE-2016-8638 ipsilon: DoS via logging out all open SAML2 sessions
Hi,
This is to inform you of the following CVE:
CVE-2016-8638 ipsilon: DoS via logging out all open SAML2 sessions
Description :
A vulnerability in ipsilon was found that allows attacker to log out active
sessions of other users. This issue is related to how it tracks sessions, and
allows an unauthenticated attacker to view and terminate active sessions from
other users.
Note: this bug can also be triggered accidentally.
Upstream patch :
https://pagure.io/ipsilon/c/511fa8b7001c2f9a42301aa1d4b85aaf170a461c
Vulnerable versions:
All versions of Ipsilon 2.0 before 2.0.2 are vulnerable.
All versions of Ipsilon 1.2 before 1.2.1 are vulnerable.
All versions of Ipsilon 1.1 before 1.1.2 are vulnerable.
All versions of Ipsilon 1.0 before 1.0.3 are vulnerable.
Impact: Important
CVSS3 scoring : 8.2 AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H
Reported by: Patrick Uiterwijk (Red Hat) and Howard Johnson
Reference :
https://ipsilon-project.org/advisory/CVE-2016-8638.txt
Best Regards,
--
Cedric Buissart
Red Hat Product Security
-----------------------------------------
Download attachment "signature.asc" of type "application/pgp-signature" (474 bytes)
Powered by blists - more mailing lists
Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.