UBUNTU-CVE-2017-12873

Source
https://ubuntu.com/security/CVE-2017-12873
Import Source
https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2017/UBUNTU-CVE-2017-12873.json
JSON Data
https://api.test.osv.dev/v1/vulns/UBUNTU-CVE-2017-12873
Upstream
Published
2017-09-01T21:29:00Z
Modified
2025-07-16T07:33:26.578900Z
Severity
  • 9.8 (Critical) CVSS_V3 - CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H CVSS Calculator
  • Ubuntu - medium
Summary
[none]
Details

SimpleSAMLphp 1.7.0 through 1.14.10 might allow attackers to obtain sensitive information, gain unauthorized access, or have unspecified other impacts by leveraging incorrect persistent NameID generation when an Identity Provider (IdP) is misconfigured.

References

Affected packages

Ubuntu:Pro:16.04:LTS / simplesamlphp

Package

Name
simplesamlphp
Purl
pkg:deb/ubuntu/simplesamlphp@1.14.0-1ubuntu2?arch=source&distro=esm-apps/xenial

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

1.*

1.13.2-1
1.14.0-1
1.14.0-1ubuntu2

Ubuntu:18.04:LTS / simplesamlphp

Package

Name
simplesamlphp
Purl
pkg:deb/ubuntu/simplesamlphp@1.14.15-1?arch=source&distro=bionic

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
1.14.15-1

Ecosystem specific

{
    "availability": "No subscription required",
    "binaries": [
        {
            "binary_name": "simplesamlphp",
            "binary_version": "1.14.15-1"
        }
    ]
}