Apache Santuario XML Security for C++ (aka xml-security-c) before 1.7.1 does not properly validate length values, which allows remote attackers to cause a denial of service or bypass the CVE-2009-0217 protection mechanism and spoof a signature via crafted length values to the (1) compareBase64StringToRaw, (2) DSIGAlgorithmHandlerDefault, or (3) DSIGAlgorithmHandlerDefault::verify functions.
https://www.tenable.com/security/tns-2018-15
http://www.debian.org/security/2013/dsa-2710
http://santuario.apache.org/secadv.data/CVE-2013-2155.txt
http://archives.neohapsis.com/archives/fulldisclosure/2013-06/0142.html