Off-by-one error in the XML signature feature in Apache XML Security for C++ 1.6.0, as used in Shibboleth before 2.4.3 and possibly other products, allows remote attackers to cause a denial of service (crash) via a signature using a large RSA key, which triggers a buffer overflow.
lists.fedoraproject.org/pipermail/package-announce/2011-July/063159.html
lists.fedoraproject.org/pipermail/package-announce/2011-July/063229.html
santuario.apache.org/secadv/CVE-2011-2516.txt
secunia.com/advisories/45151
secunia.com/advisories/45191
secunia.com/advisories/45198
secunia.com/advisories/45491
shibboleth.internet2.edu/secadv/secadv_20110706.txt
www.debian.org/security/2011/dsa-2277
www.securityfocus.com/archive/1/518756/100/0/threaded
www.securityfocus.com/bid/48611
www.securitytracker.com/id?1025755
exchange.xforce.ibmcloud.com/vulnerabilities/68420
issues.apache.org/jira/browse/SANTUARIO-271
lists.apache.org/thread.html/680e6938b6412e26d5446054fd31de2011d33af11786b989127d1cc3%40%3Ccommits.santuario.apache.org%3E
lists.apache.org/thread.html/r1c07a561426ec5579073046ad7f4207cdcef452bb3100abaf908e0cd%40%3Ccommits.santuario.apache.org%3E