Protect yourself against future threats.
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 =========================================================================== AUSCERT External Security Bulletin Redistribution ESB-2018.0620 simplesamlphp security update 5 March 2018 =========================================================================== AusCERT Security Bulletin Summary --------------------------------- Product: simplesamlphp Publisher: Debian Operating System: Debian GNU/Linux 8 Debian GNU/Linux 9 Impact/Access: Denial of Service -- Remote/Unauthenticated Cross-site Scripting -- Remote with User Interaction Provide Misleading Information -- Existing Account Unauthorised Access -- Remote/Unauthenticated Resolution: Patch/Upgrade CVE Names: CVE-2018-6521 CVE-2018-6519 CVE-2017-18122 CVE-2017-18121 CVE-2017-12874 CVE-2017-12873 CVE-2017-12869 CVE-2017-12867 Reference: ESB-2018.0413 Original Bulletin: http://www.debian.org/security/2018/dsa-4127 - --------------------------BEGIN INCLUDED TEXT-------------------- - -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 - - ------------------------------------------------------------------------- Debian Security Advisory DSA-4127-1 security@debian.org https://www.debian.org/security/ Thijs Kinkhorst March 02, 2018 https://www.debian.org/security/faq - - ------------------------------------------------------------------------- Package : simplesamlphp CVE ID : CVE-2017-12867 CVE-2017-12869 CVE-2017-12873 CVE-2017-12874 CVE-2017-18121 CVE-2017-18122 CVE-2018-6519 CVE-2018-6521 Debian Bug : 889286 Several vulnerabilities have been discovered in SimpleSAMLphp, a framework for authentication, primarily via the SAML protocol. CVE-2017-12867 Attackers with access to a secret token could extend its validity period by manipulating the prepended time offset. CVE-2017-12869 When using the multiauth module, attackers can bypass authentication context restrictions and use any authentication source defined in the config. CVE-2017-12873 Defensive measures have been taken to prevent the administrator from misconfiguring persistent NameIDs to avoid identifier clash. (Affects Debian 8 Jesse only.) CVE-2017-12874 The InfoCard module could accept incorrectly signed XML messages in rare occasions. CVE-2017-18121 The consentAdmin module was vulnerable to a Cross-Site Scripting attack, allowing an attacker to craft links that could execute arbitrary JavaScript code in the victim's browser. CVE-2017-18122 The (deprecated) SAML 1.1 implementation would regard as valid any unsigned SAML response containing more than one signed assertion, provided that the signature of at least one of the assertions was valid, allowing an attacker that could obtain a valid signed assertion from an IdP to impersonate users from that IdP. CVE-2018-6519 Regular expression denial of service when parsing extraordinarily long timestamps. CVE-2018-6521 Change sqlauth module MySQL charset from utf8 to utf8mb to prevent theoretical query truncation that could allow remote attackers to bypass intended access restrictions SSPSA-201802-01 (no CVE yet) Critical signature validation vulnerability. For the oldstable distribution (jessie), these problems have been fixed in version 1.13.1-2+deb8u1. For the stable distribution (stretch), these problems have been fixed in version 1.14.11-1+deb9u1. We recommend that you upgrade your simplesamlphp packages. For the detailed security status of simplesamlphp please refer to its security tracker page at: https://security-tracker.debian.org/tracker/simplesamlphp Further information about Debian Security Advisories, how to apply these updates to your system and frequently asked questions can be found at: https://www.debian.org/security/ Mailing list: debian-security-announce@lists.debian.org - -----BEGIN PGP SIGNATURE----- iQEuBAEBCAAYBQJamOwIERx0aGlqc0BkZWJpYW4ub3JnAAoJEFb2GnlAHawEn6IH /3wbUbHLQUuTHhS2E+n4u//hv9kE0TUrjXZak47KYo6vFwhxHyDeKAWlDFqwld8y L6a5OFL9UZNaQbTOh8MvgD7Q9y8dwiGlC2USjBWlA7BO2HunZ2jqy904c1q36d7I fAH4TszQ7P/k8uxkNCRPH5GZZiiYnZXRtjiC+x2R860jSHvtlLg0/rMKqSdgBKXd sD5Dkx4oSeXTZiIVJQl7J+d1rUnuxBAidaqcSIgJOzXsOoPHbS7pfczpZ6kte9K6 s6PfSP39OPIfwbFTTxs1q9SBV3lv59QL3tW91i/XucAAyvsUsvqLVN5xRDllAIAc RjhqAED45Wis3aG2D7c7Rhc= =6tNs - -----END PGP SIGNATURE----- - --------------------------END INCLUDED TEXT-------------------- You have received this e-mail bulletin as a result of your organisation's registration with AusCERT. The mailing list you are subscribed to is maintained within your organisation, so if you do not wish to continue receiving these bulletins you should contact your local IT manager. If you do not know who that is, please send an email to auscert@auscert.org.au and we will forward your request to the appropriate person. NOTE: Third Party Rights This security bulletin is provided as a service to AusCERT's members. As AusCERT did not write the document quoted above, AusCERT has had no control over its content. The decision to follow or act on information or advice contained in this security bulletin is the responsibility of each user or organisation, and should be considered in accordance with your organisation's site policies and procedures. AusCERT takes no responsibility for consequences which may arise from following or acting on information or advice contained in this security bulletin. NOTE: This is only the original release of the security bulletin. It may not be updated when updates to the original are made. If downloading at a later date, it is recommended that the bulletin is retrieved directly from the author's website to ensure that the information is still current. Contact information for the authors of the original document is included in the Security Bulletin above. If you have any questions or need further information, please contact them directly. Previous advisories and external security bulletins can be retrieved from: https://www.auscert.org.au/bulletins/ =========================================================================== Australian Computer Emergency Response Team The University of Queensland Brisbane Qld 4072 Internet Email: auscert@auscert.org.au Facsimile: (07) 3365 7031 Telephone: (07) 3365 4417 (International: +61 7 3365 4417) AusCERT personnel answer during Queensland business hours which are GMT+10:00 (AEST). On call after hours for member emergencies only. =========================================================================== -----BEGIN PGP SIGNATURE----- Comment: http://www.auscert.org.au/render.html?it=1967 iQIVAwUBWpyWLox+lLeg9Ub1AQjZyg//TbrGZ80fSH9nwncuunzYsNZcoNwGqAbZ OmHT3yxPWE0Tw140o9KUHFa+vtij8nnI7DClLL01u6p1jRBOF7Z152+7g7znlD7q eYE7PI2m/DwhG49s2yytcs1aHUG8MiTxuXpcEl7nm0WWKtruKvQ6C6whHFjEebwj qORlbIvAuoMDYnO330O1MaBWZnGIz3Ca7cJXbRkG7XMV6/bjif2dKGmynlrfaBao vEniD59Eq7/945L55/8m0WLEoUqRCtdANn8cD+2GfOjgHXuoMlUjAywmNpwkkHwO n7vorsDOQnrLir+yQUVlopfcqxCxLCK7xThSYg9MludXGuFxtWQZ82f6mO5buRBB uQonhs/SabFL3H3xlkBfhMnal8m3tNaXCJ88QBYOsGyxJDnEOGsmtn3hUIUjN/63 zym2RMBtlysux5i9cu5O9QtGhMOZ2ncpHHu82eFz6SQQu8XuxFhtXcCynjo4g986 NzsOcoM7BVtuLT5dZxSHd/fpBRGu3ANMYEN2XINWTMA1iLiQFzbO7ZORr2la5SdC VQxT7g/++gjsYUGEUlITLh1U+jJ1A175IlvOWMUv80Q4C3ZuQFuhmmo3HFHmidBk 2YulT26wshXRPb2Hf9lwt0TaXbIEStc0sCjMLzDM54NJydADN7ht7Gnok4f1c8HG dKYic65xlvY= =b1QL -----END PGP SIGNATURE-----