CVE-2009-0217

N/A Unknown
Published: July 14, 2009 Modified: April 23, 2026
View on NVD

Description

The design of the W3C XML Signature Syntax and Processing (XMLDsig) recommendation, as implemented in products including (1) the Oracle Security Developer Tools component in Oracle Application Server 10.1.2.3, 10.1.3.4, and 10.1.4.3IM; (2) the WebLogic Server component in BEA Product Suite 10.3, 10.0 MP1, 9.2 MP3, 9.1, 9.0, and 8.1 SP6; (3) Mono before 2.4.2.2; (4) XML Security Library before 1.2.12; (5) IBM WebSphere Application Server Versions 6.0 through 6.0.2.33, 6.1 through 6.1.0.23, and 7.0 through 7.0.0.1; (6) Sun JDK and JRE Update 14 and earlier; (7) Microsoft .NET Framework 3.0 through 3.0 SP2, 3.5, and 4.0; and other products uses a parameter that defines an HMAC truncation length (HMACOutputLength) but does not require a minimum for this length, which allows attackers to spoof HMAC-based signatures and bypass authentication by specifying a truncation length with a small number of bits.

AI Explanation

Get an AI-powered plain-language explanation of this vulnerability and remediation steps.

Login to generate AI explanation

References to Advisories, Solutions, and Tools

Patch Vendor Advisory Exploit Third Party Advisory
http://osvdb.org/55895
Source: cret@cert.org
http://osvdb.org/55907
Source: cret@cert.org
http://secunia.com/advisories/35776
Source: cret@cert.org
Vendor Advisory
http://secunia.com/advisories/35852
Source: cret@cert.org
Vendor Advisory
http://secunia.com/advisories/35853
Source: cret@cert.org
Vendor Advisory
http://secunia.com/advisories/35854
Source: cret@cert.org
Vendor Advisory
http://secunia.com/advisories/35855
Source: cret@cert.org
Vendor Advisory
http://secunia.com/advisories/35858
Source: cret@cert.org
Vendor Advisory
http://secunia.com/advisories/36162
Source: cret@cert.org
Vendor Advisory
http://secunia.com/advisories/36176
Source: cret@cert.org
Vendor Advisory
http://secunia.com/advisories/36180
Source: cret@cert.org
Vendor Advisory
http://secunia.com/advisories/36494
Source: cret@cert.org
Vendor Advisory
http://www-01.ibm.com/support/docview.wss?rs=180&uid=swg21384925
Source: cret@cert.org
Patch Vendor Advisory
http://www.aleksey.com/xmlsec/
Source: cret@cert.org
http://www.kb.cert.org/vuls/id/466161
Source: cret@cert.org
US Government Resource
http://www.mono-project.com/Vulnerabilities
Source: cret@cert.org
Vendor Advisory
http://www.securityfocus.com/bid/35671
Source: cret@cert.org
Patch
http://www.us-cert.gov/cas/techalerts/TA09-294A.html
Source: cret@cert.org
US Government Resource
http://www.us-cert.gov/cas/techalerts/TA10-159B.html
Source: cret@cert.org
US Government Resource
http://www.vupen.com/english/advisories/2009/1900
Source: cret@cert.org
Patch Vendor Advisory
http://www.vupen.com/english/advisories/2009/1908
Source: cret@cert.org
Patch Vendor Advisory
http://www.vupen.com/english/advisories/2009/1909
Source: cret@cert.org
Patch Vendor Advisory
http://www.vupen.com/english/advisories/2009/1911
Source: cret@cert.org
Patch Vendor Advisory
http://www.w3.org/2008/06/xmldsigcore-errata.html#e03
Source: cret@cert.org
Vendor Advisory
https://usn.ubuntu.com/826-1/
Source: cret@cert.org
http://marc.info/?l=bugtraq&m=125787273209737&w=2
Source: af854a3a-2127-422b-91ae-364da2661108
http://osvdb.org/55895
Source: af854a3a-2127-422b-91ae-364da2661108
http://osvdb.org/55907
Source: af854a3a-2127-422b-91ae-364da2661108
http://secunia.com/advisories/34461
Source: af854a3a-2127-422b-91ae-364da2661108
http://secunia.com/advisories/35776
Source: af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
http://secunia.com/advisories/35852
Source: af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
http://secunia.com/advisories/35853
Source: af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
http://secunia.com/advisories/35854
Source: af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
http://secunia.com/advisories/35855
Source: af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
http://secunia.com/advisories/35858
Source: af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
http://secunia.com/advisories/36162
Source: af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
http://secunia.com/advisories/36176
Source: af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
http://secunia.com/advisories/36180
Source: af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
http://secunia.com/advisories/36494
Source: af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
http://secunia.com/advisories/37300
Source: af854a3a-2127-422b-91ae-364da2661108
http://secunia.com/advisories/37671
Source: af854a3a-2127-422b-91ae-364da2661108
http://secunia.com/advisories/37841
Source: af854a3a-2127-422b-91ae-364da2661108
http://secunia.com/advisories/38567
Source: af854a3a-2127-422b-91ae-364da2661108
http://secunia.com/advisories/38568
Source: af854a3a-2127-422b-91ae-364da2661108
http://secunia.com/advisories/38695
Source: af854a3a-2127-422b-91ae-364da2661108
http://secunia.com/advisories/38921
Source: af854a3a-2127-422b-91ae-364da2661108
http://secunia.com/advisories/41818
Source: af854a3a-2127-422b-91ae-364da2661108
http://secunia.com/advisories/60799
Source: af854a3a-2127-422b-91ae-364da2661108
http://sunsolve.sun.com/search/document.do?assetkey=1-66-263429-1
Source: af854a3a-2127-422b-91ae-364da2661108
http://sunsolve.sun.com/search/document.do?assetkey=1-66-269208-1
Source: af854a3a-2127-422b-91ae-364da2661108
http://svn.apache.org/viewvc?revision=794013&view=revision
Source: af854a3a-2127-422b-91ae-364da2661108
http://www-01.ibm.com/support/docview.wss?rs=180&uid=swg21384925
Source: af854a3a-2127-422b-91ae-364da2661108
Patch Vendor Advisory
http://www.aleksey.com/xmlsec/
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.debian.org/security/2010/dsa-1995
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.gentoo.org/security/en/glsa/glsa-201408-19.xml
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.kb.cert.org/vuls/id/466161
Source: af854a3a-2127-422b-91ae-364da2661108
US Government Resource
http://www.kb.cert.org/vuls/id/MAPG-7TSKXQ
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.kb.cert.org/vuls/id/WDON-7TY529
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.mandriva.com/security/advisories?name=MDVSA-2009:209
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.mono-project.com/Vulnerabilities
Source: af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
http://www.openoffice.org/security/cves/CVE-2009-0217.html
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.redhat.com/support/errata/RHSA-2009-1694.html
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.securityfocus.com/bid/35671
Source: af854a3a-2127-422b-91ae-364da2661108
Patch
http://www.securitytracker.com/id?1022561
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.securitytracker.com/id?1022567
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.securitytracker.com/id?1022661
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.ubuntu.com/usn/USN-903-1
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.us-cert.gov/cas/techalerts/TA09-294A.html
Source: af854a3a-2127-422b-91ae-364da2661108
US Government Resource
http://www.us-cert.gov/cas/techalerts/TA10-159B.html
Source: af854a3a-2127-422b-91ae-364da2661108
US Government Resource
http://www.vupen.com/english/advisories/2009/1900
Source: af854a3a-2127-422b-91ae-364da2661108
Patch Vendor Advisory
http://www.vupen.com/english/advisories/2009/1908
Source: af854a3a-2127-422b-91ae-364da2661108
Patch Vendor Advisory
http://www.vupen.com/english/advisories/2009/1909
Source: af854a3a-2127-422b-91ae-364da2661108
Patch Vendor Advisory
http://www.vupen.com/english/advisories/2009/1911
Source: af854a3a-2127-422b-91ae-364da2661108
Patch Vendor Advisory
http://www.vupen.com/english/advisories/2009/2543
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.vupen.com/english/advisories/2009/3122
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.vupen.com/english/advisories/2010/0366
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.vupen.com/english/advisories/2010/0635
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.w3.org/2008/06/xmldsigcore-errata.html#e03
Source: af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
http://www.w3.org/QA/2009/07/hmac_truncation_in_xml_signatu.html
Source: af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
https://bugzilla.redhat.com/show_bug.cgi?id=511915
Source: af854a3a-2127-422b-91ae-364da2661108
https://issues.apache.org/bugzilla/show_bug.cgi?id=47526
Source: af854a3a-2127-422b-91ae-364da2661108
https://issues.apache.org/bugzilla/show_bug.cgi?id=47527
Source: af854a3a-2127-422b-91ae-364da2661108
https://rhn.redhat.com/errata/RHSA-2009-1200.html
Source: af854a3a-2127-422b-91ae-364da2661108
https://rhn.redhat.com/errata/RHSA-2009-1201.html
Source: af854a3a-2127-422b-91ae-364da2661108
https://rhn.redhat.com/errata/RHSA-2009-1428.html
Source: af854a3a-2127-422b-91ae-364da2661108
https://rhn.redhat.com/errata/RHSA-2009-1636.html
Source: af854a3a-2127-422b-91ae-364da2661108
https://rhn.redhat.com/errata/RHSA-2009-1637.html
Source: af854a3a-2127-422b-91ae-364da2661108
https://rhn.redhat.com/errata/RHSA-2009-1649.html
Source: af854a3a-2127-422b-91ae-364da2661108
https://rhn.redhat.com/errata/RHSA-2009-1650.html
Source: af854a3a-2127-422b-91ae-364da2661108
https://usn.ubuntu.com/826-1/
Source: af854a3a-2127-422b-91ae-364da2661108

172 reference(s) from NVD

Quick Stats

CVSS v3 Score
N/A / 10.0
EPSS (Exploit Probability)
2.2%
85th percentile
Exploitation Status
Not in CISA KEV

Affected Vendors

mono_project ibm oracle