Off-by-one error in the XML signature feature in Apache XML Security for C++ 1.6.0, as used in Shibboleth before 2.4.3 and possibly other products, allows remote attackers to cause a denial of service (crash) via a signature using a large RSA key, which triggers a buffer overflow.
https://exchange.xforce.ibmcloud.com/vulnerabilities/68420
http://www.securitytracker.com/id?1025755
http://www.securityfocus.com/bid/48611
http://www.securityfocus.com/archive/1/518756/100/0/threaded
http://www.debian.org/security/2011/dsa-2277
http://shibboleth.internet2.edu/secadv/secadv_20110706.txt
http://secunia.com/advisories/45491
http://secunia.com/advisories/45198
http://secunia.com/advisories/45191
http://secunia.com/advisories/45151
http://santuario.apache.org/secadv/CVE-2011-2516.txt
http://lists.fedoraproject.org/pipermail/package-announce/2011-July/063229.html
http://lists.fedoraproject.org/pipermail/package-announce/2011-July/063159.html