The XML Signature specification allows for HMAC truncation, which may allow a remote attacker to bypass authentication.
XML Signature Syntax and Processing (XMLDsig) is a W3C recommendation for providing integrity, message authentication, and/or signer authentication services for data. XMLDsig is commonly used by web services such as SOAP. The XMLDsig recommendation includes support for HMAC truncation, as specified in RFC2104. However, the XMLDsig specification does not follow the RFC2104 recommendation to not allow truncation to less than half of the length of the hash output or less than 80 bits. When HMAC truncation is under the control of an attacker this can result in an effective authentication bypass. For example, by specifying an HMACOutputLength of
1, only one bit of the signature is verified. This can allow an attacker to forge an XML signature that will be accepted as valid.
This vulnerability can allow an attacker to bypass the authentication mechanism provided by the XML Signature specification.
Apply an update
Please check with your vendor for available updates. Erratum E03 for the XMLDsig recommendation has been added, which specifies minimum values for HMAC truncation.
Vendor| Status| Date Notified| Date Updated
Apache XML Security| | -| 14 Jul 2009
Apple Inc.| | 09 Jul 2009| 10 Jul 2009
Debian GNU/Linux| | 09 Jul 2009| 14 Jul 2009
IBM Corporation| | 09 Jul 2009| 14 Jul 2009
Mono-Project| | -| 10 Jul 2009
Oracle Corporation| | -| 13 Jul 2009
RSA Security, Inc.| | -| 14 Jul 2009
Sun Microsystems, Inc.| | 09 Jul 2009| 05 Aug 2009
XML Security Library| | -| 10 Jul 2009
Force10 Networks, Inc.| | 09 Jul 2009| 14 Jul 2009
m0n0wall| | 09 Jul 2009| 10 Jul 2009
PePLink| | 09 Jul 2009| 20 Jul 2009
Q1 Labs| | 09 Jul 2009| 10 Jul 2009
The SCO Group| | 09 Jul 2009| 13 Jul 2009
VMware| | 09 Jul 2009| 14 Jul 2009
If you are a vendor and your product is affected, let us know.
Group | Score | Vector
Base | N/A | N/A
Temporal | N/A | N/A
Environmental | N/A | N/A
Thanks to Thomas Roessler of the W3C for reporting this vulnerability.
This document was written by Will Dormann.