Hi all,

I have just putback a fix for this vulnerability to the source code repository. This patch will be included in the (Java) version 1.4.3 release. Because of the potential severity of this issue, we are planning an expedited release process for 1.4.3. I plan to make available a jar for testing later today and a more complete release candidate binary tomorrow. If no issues are found then we will call for a vote later this week and work towards making a final version available early next week.

Thanks,
Sean

bugzi...@apache.org wrote:
https://issues.apache.org/bugzilla/show_bug.cgi?id=47526

           Summary: XML signature HMAC truncation authentication bypass
           Product: Security
           Version: Java 1.4.2
          Platform: All
        OS/Version: All
            Status: NEW
          Severity: critical
          Priority: P1
         Component: Signature
        AssignedTo: security-dev@xml.apache.org
        ReportedBy: sean.mul...@sun.com


Apache XML Security (Java) is affected by the vulnerability published in
US-Cert VU #466161. See: http://www.kb.cert.org/vuls/id/466161 for more
information. This bug can allow an attacker to bypass authentication by
inserting/modifying a small HMAC truncation length parameter in the XML
Signature HMAC based SignatureMethod algorithms.


Reply via email to