Vulnerability Description
The validateSignature method in the SAML2\Utils class in SimpleSAMLphp before 1.14.10 and simplesamlphp/saml2 library before 1.9.1, 1.10.x before 1.10.3, and 2.x before 2.3.3 allows remote attackers to spoof SAML responses or possibly cause a denial of service (memory consumption) by leveraging improper conversion of return values to boolean.
CVSS Score
CRITICAL
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Simplesamlphp | Simplesamlphp | <= 1.14.9 |
| Simplesamlphp | Saml2 | <= 1.9 |
Related Weaknesses (CWE)
References
- http://www.securityfocus.com/bid/94730Third Party AdvisoryVDB Entry
- https://lists.debian.org/debian-lts-announce/2018/03/msg00001.html
- https://simplesamlphp.org/security/201612-01Vendor Advisory
- http://www.securityfocus.com/bid/94730Third Party AdvisoryVDB Entry
- https://lists.debian.org/debian-lts-announce/2018/03/msg00001.html
- https://simplesamlphp.org/security/201612-01Vendor Advisory
FAQ
What is CVE-2016-9814?
CVE-2016-9814 is a vulnerability with a CVSS score of 9.1 (CRITICAL). The validateSignature method in the SAML2\Utils class in SimpleSAMLphp before 1.14.10 and simplesamlphp/saml2 library before 1.9.1, 1.10.x before 1.10.3, and 2.x before 2.3.3 allows remote attackers t...
How severe is CVE-2016-9814?
CVE-2016-9814 has been rated CRITICAL with a CVSS base score of 9.1/10. This is considered a critical vulnerability requiring immediate attention.
Is there a patch for CVE-2016-9814?
Check the references section above for vendor advisories and patch information. Affected products include: Simplesamlphp Simplesamlphp, Simplesamlphp Saml2.