-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

===========================================================================
             AUSCERT External Security Bulletin Redistribution

                               ESB-2018.0620
                       simplesamlphp security update
                               5 March 2018

===========================================================================

        AusCERT Security Bulletin Summary
        ---------------------------------

Product:           simplesamlphp
Publisher:         Debian
Operating System:  Debian GNU/Linux 8
                   Debian GNU/Linux 9
Impact/Access:     Denial of Service              -- Remote/Unauthenticated      
                   Cross-site Scripting           -- Remote with User Interaction
                   Provide Misleading Information -- Existing Account            
                   Unauthorised Access            -- Remote/Unauthenticated      
Resolution:        Patch/Upgrade
CVE Names:         CVE-2018-6521 CVE-2018-6519 CVE-2017-18122
                   CVE-2017-18121 CVE-2017-12874 CVE-2017-12873
                   CVE-2017-12869 CVE-2017-12867 

Reference:         ESB-2018.0413

Original Bulletin: 
   http://www.debian.org/security/2018/dsa-4127

- --------------------------BEGIN INCLUDED TEXT--------------------

- -----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

- - -------------------------------------------------------------------------
Debian Security Advisory DSA-4127-1                   security@debian.org
https://www.debian.org/security/                          Thijs Kinkhorst
March 02, 2018                        https://www.debian.org/security/faq
- - -------------------------------------------------------------------------

Package        : simplesamlphp
CVE ID         : CVE-2017-12867 CVE-2017-12869 CVE-2017-12873
                 CVE-2017-12874 CVE-2017-18121 CVE-2017-18122
                 CVE-2018-6519 CVE-2018-6521
Debian Bug     : 889286

Several vulnerabilities have been discovered in SimpleSAMLphp, a
framework for authentication, primarily via the SAML protocol.

CVE-2017-12867

     Attackers with access to a secret token could extend its validity
     period by manipulating the prepended time offset.

CVE-2017-12869

    When using the multiauth module, attackers can bypass authentication
    context restrictions and use any authentication source defined in
    the config.

CVE-2017-12873

    Defensive measures have been taken to prevent the administrator
    from misconfiguring persistent NameIDs to avoid identifier clash.
    (Affects Debian 8 Jesse only.)

CVE-2017-12874

    The InfoCard module could accept incorrectly signed XML messages
    in rare occasions.

CVE-2017-18121

    The consentAdmin module was vulnerable to a Cross-Site Scripting
    attack, allowing an attacker to craft links that could execute
     arbitrary JavaScript code in the victim's browser.

CVE-2017-18122

    The (deprecated) SAML 1.1 implementation would regard as valid any
    unsigned SAML response containing more than one signed assertion,
    provided that the signature of at least one of the assertions was
    valid, allowing an attacker that could obtain a valid signed
    assertion from an IdP to impersonate users from that IdP.

CVE-2018-6519

    Regular expression denial of service when parsing extraordinarily
    long timestamps.

CVE-2018-6521

    Change sqlauth module MySQL charset from utf8 to utf8mb to
    prevent theoretical query truncation that could allow remote
    attackers to bypass intended access restrictions

SSPSA-201802-01 (no CVE yet)

    Critical signature validation vulnerability.

For the oldstable distribution (jessie), these problems have been fixed
in version 1.13.1-2+deb8u1.

For the stable distribution (stretch), these problems have been fixed in
version 1.14.11-1+deb9u1.

We recommend that you upgrade your simplesamlphp packages.

For the detailed security status of simplesamlphp please refer to
its security tracker page at:
https://security-tracker.debian.org/tracker/simplesamlphp

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/

Mailing list: debian-security-announce@lists.debian.org
- -----BEGIN PGP SIGNATURE-----

iQEuBAEBCAAYBQJamOwIERx0aGlqc0BkZWJpYW4ub3JnAAoJEFb2GnlAHawEn6IH
/3wbUbHLQUuTHhS2E+n4u//hv9kE0TUrjXZak47KYo6vFwhxHyDeKAWlDFqwld8y
L6a5OFL9UZNaQbTOh8MvgD7Q9y8dwiGlC2USjBWlA7BO2HunZ2jqy904c1q36d7I
fAH4TszQ7P/k8uxkNCRPH5GZZiiYnZXRtjiC+x2R860jSHvtlLg0/rMKqSdgBKXd
sD5Dkx4oSeXTZiIVJQl7J+d1rUnuxBAidaqcSIgJOzXsOoPHbS7pfczpZ6kte9K6
s6PfSP39OPIfwbFTTxs1q9SBV3lv59QL3tW91i/XucAAyvsUsvqLVN5xRDllAIAc
RjhqAED45Wis3aG2D7c7Rhc=
=6tNs
- -----END PGP SIGNATURE-----

- --------------------------END INCLUDED TEXT--------------------

You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.

NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT's members.  As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.

NOTE: This is only the original release of the security bulletin.  It may
not be updated when updates to the original are made.  If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.

Contact information for the authors of the original document is included
in the Security Bulletin above.  If you have any questions or need further
information, please contact them directly.

Previous advisories and external security bulletins can be retrieved from:

        https://www.auscert.org.au/bulletins/

===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile:      (07) 3365 7031
Telephone:      (07) 3365 4417 (International: +61 7 3365 4417)
                AusCERT personnel answer during Queensland business hours
                which are GMT+10:00 (AEST).
                On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: http://www.auscert.org.au/render.html?it=1967
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=b1QL
-----END PGP SIGNATURE-----