{"id":"CVE-2016-9955","details":"The SimpleSAML_XML_Validator class constructor in SimpleSAMLphp before 1.14.11 might allow remote attackers to spoof signatures on SAML 1 responses or possibly cause a denial of service (memory consumption) by leveraging improper conversion of return values to boolean.","aliases":["GHSA-p9cm-r7jg-8q3g"],"modified":"2026-05-14T04:02:12.483802749Z","published":"2017-02-17T02:59:14.233Z","database_specific":{},"references":[{"type":"ADVISORY","url":"http://www.securityfocus.com/bid/94946"},{"type":"ADVISORY","url":"https://lists.debian.org/debian-lts-announce/2018/03/msg00001.html"},{"type":"ADVISORY","url":"https://simplesamlphp.org/security/201612-02"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/cesnet/proxystatistics-simplesamlphp-module","events":[{"introduced":"0"},{"last_affected":"454bbead35b50c99470cc68aa139fb9b73c22b2a"}],"database_specific":{"source":"CPE_FIELD","cpe":"cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*","extracted_events":[{"introduced":"0"},{"last_affected":"7.0"}]}}],"versions":["v7.0.0","v6.0.0","v5.0.0","v4.3.0"],"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2016-9955.json"}},{"ranges":[{"type":"GIT","repo":"https://github.com/simplesamlphp/simplesamlphp","events":[{"introduced":"0"},{"fixed":"b96dcc500caae73954d4f01189e0209afc6086be"}],"database_specific":{"cpe":"cpe:2.3:a:simplesamlphp:simplesamlphp:*:*:*:*:*:*:*:*","source":"CPE_FIELD","extracted_events":[{"introduced":"0"},{"fixed":"1.14.11"}]}}],"versions":["v1.14.2","v1.14.10","v1.14.9","v1.14.8","v1.14.7","v1.14.6","v1.14.5","v1.14.4","v1.14.3","v1.14.1","v1.14.0","v1.14.0-rc1","v1.12.0"],"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2016-9955.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:H"}]}