MGASA-2014-0557

Source
https://advisories.mageia.org/MGASA-2014-0557.html
Import Source
https://advisories.mageia.org/MGASA-2014-0557.json
JSON Data
https://api.osv.dev/v1/vulns/MGASA-2014-0557
Related
Published
2014-12-31T12:28:04Z
Modified
2014-12-31T12:19:27Z
Summary
Updated cxf packages fix security vulnerabilities
Details

Updated cxf packages fix security vulnerabilities:

An Apache CXF JAX-RS service can process SAML tokens received in the authorization header of a request via the SamlHeaderInHandler. However it is possible to cause an infinite loop in the parsing of this header by passing certain bad values for the header, leading to a Denial of Service attack on the service (CVE-2014-3584).

Apache CXF is vulnerable to a possible SSL hostname verification bypass, due to a flaw in comparing the server hostname to the domain name in the Subject's DN field. A Man In The Middle attack can exploit this vulnerability by using a specially crafted Subject DN to spoof a valid certificate (CVE-2014-3577).

References
Credits

Affected packages

Mageia:4 / cxf

Package

Name
cxf
Purl
pkg:rpm/mageia/cxf?distro=mageia-4

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
2.7.5-3.1.mga4

Ecosystem specific

{
    "section": "core"
}