Shibboleth Service Provider 3.x before 3.2.2 is prone to a NULL pointer dereference flaw involving the session recovery feature. The flaw is exploitable (for a daemon crash) on systems not using this feature if a crafted cookie is supplied.
References
Link | Resource |
---|---|
https://bugs.debian.org/987608 | Mailing List Third Party Advisory |
https://git.shibboleth.net/view/?p=cpp-sp.git%3Ba=commit%3Bh=5a47c3b9378f4c49392dd4d15189b70956f9f2ec | |
https://issues.shibboleth.net/jira/browse/SSPCPP-927 | Exploit Patch Vendor Advisory |
https://shibboleth.net/community/advisories/secadv_20210426.txt | Vendor Advisory |
https://www.debian.org/security/2021/dsa-4905 | Third Party Advisory |
Configurations
History
07 Nov 2023, 03:35
Type | Values Removed | Values Added |
---|---|---|
References |
|
|
07 May 2021, 17:49
Type | Values Removed | Values Added |
---|---|---|
CWE | CWE-476 | |
CPE | cpe:2.3:a:shibboleth:service_provider:*:*:*:*:*:*:*:* | |
CVSS |
v2 : v3 : |
v2 : 5.0
v3 : 7.5 |
References | (MISC) https://git.shibboleth.net/view/?p=cpp-sp.git;a=commit;h=5a47c3b9378f4c49392dd4d15189b70956f9f2ec - Mailing List, Vendor Advisory | |
References | (MISC) https://bugs.debian.org/987608 - Mailing List, Third Party Advisory | |
References | (MISC) https://issues.shibboleth.net/jira/browse/SSPCPP-927 - Exploit, Patch, Vendor Advisory | |
References | (MISC) https://shibboleth.net/community/advisories/secadv_20210426.txt - Vendor Advisory | |
References | (DEBIAN) https://www.debian.org/security/2021/dsa-4905 - Third Party Advisory |
28 Apr 2021, 05:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
27 Apr 2021, 04:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2021-04-27 04:15
Updated : 2023-12-10 13:55
NVD link : CVE-2021-31826
Mitre link : CVE-2021-31826
CVE.ORG link : CVE-2021-31826
JSON object : View
Products Affected
shibboleth
- service_provider
CWE
CWE-476
NULL Pointer Dereference