ID CVE-2012-2145
Summary Apache Qpid 0.17 and earlier does not properly restrict incoming client connections, which allows remote attackers to cause a denial of service (file descriptor consumption) via a large number of incomplete connections.
References
Vulnerable Configurations
  • Apache Software Foundation Qpid 0.9
    cpe:2.3:a:apache:qpid:0.9
  • Apache Software Foundation Qpid 0.10
    cpe:2.3:a:apache:qpid:0.10
  • Apache Software Foundation Qpid 0.12
    cpe:2.3:a:apache:qpid:0.12
  • Apache Software Foundation Qpid 0.14
    cpe:2.3:a:apache:qpid:0.14
  • Apache Software Foundation Qpid 0.16
    cpe:2.3:a:apache:qpid:0.16
  • Apache Software Foundation Qpid 0.17
    cpe:2.3:a:apache:qpid:0.17
  • Apache Software Foundation Qpid 0.8
    cpe:2.3:a:apache:qpid:0.8
  • Apache Software Foundation Qpid 0.7
    cpe:2.3:a:apache:qpid:0.7
  • Apache Software Foundation Qpid 0.6
    cpe:2.3:a:apache:qpid:0.6
CVSS
Base: 5.0 (as of 28-09-2012 - 14:06)
Impact:
Exploitability:
CWE CWE-399
CAPEC
Access
VectorComplexityAuthentication
NETWORK LOW NONE
Impact
ConfidentialityIntegrityAvailability
NONE NONE PARTIAL
nessus via4
  • NASL family Red Hat Local Security Checks
    NASL id REDHAT-RHSA-2012-1269.NASL
    description Updated qpid packages that fix one security issue, multiple bugs, and add various enhancements are now available for Red Hat Enterprise Linux 6. The Red Hat Security Response Team has rated this update as having moderate security impact. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available from the CVE link in the References section. Apache Qpid is a reliable, cross-platform, asynchronous messaging system that supports the Advanced Message Queuing Protocol (AMQP) in several common programming languages. It was discovered that the Qpid daemon (qpidd) did not allow the number of connections from clients to be restricted. A malicious client could use this flaw to open an excessive amount of connections, preventing other legitimate clients from establishing a connection to qpidd. (CVE-2012-2145) To address CVE-2012-2145, new qpidd configuration options were introduced: max-negotiate-time defines the time during which initial protocol negotiation must succeed, connection-limit-per-user and connection-limit-per-ip can be used to limit the number of connections per user and client host IP. Refer to the qpidd manual page for additional details. In addition, the qpid-cpp, qpid-qmf, qpid-tools, and python-qpid packages have been upgraded to upstream version 0.14, which provides support for Red Hat Enterprise MRG 2.2, as well as a number of bug fixes and enhancements over the previous version. (BZ#840053, BZ#840055, BZ#840056, BZ#840058) All users of qpid are advised to upgrade to these updated packages, which fix these issues and add these enhancements.
    last seen 2019-02-21
    modified 2018-11-10
    plugin id 62209
    published 2012-09-20
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=62209
    title RHEL 6 : qpid (RHSA-2012:1269)
  • NASL family Scientific Linux Local Security Checks
    NASL id SL_20120919_QPID_ON_SL6_X.NASL
    description Apache Qpid is a reliable, cross-platform, asynchronous messaging system that supports the Advanced Message Queuing Protocol (AMQP) in several common programming languages. It was discovered that the Qpid daemon (qpidd) did not allow the number of connections from clients to be restricted. A malicious client could use this flaw to open an excessive amount of connections, preventing other legitimate clients from establishing a connection to qpidd. (CVE-2012-2145) To address CVE-2012-2145, new qpidd configuration options were introduced: max-negotiate-time defines the time during which initial protocol negotiation must succeed, connection-limit-per-user and connection-limit-per-ip can be used to limit the number of connections per user and client host IP. Refer to the qpidd manual page for additional details. In addition, the qpid-cpp, qpid-qmf, qpid-tools, and python-qpid packages have been upgraded to upstream version 0.14, which provides a number of bug fixes and enhancements over the previous version. All users of qpid are advised to upgrade to these updated packages, which fix these issues and add these enhancements. For dependency resolution saslwrapper, saslwrapper-devel, python-saslwrapper, and ruby-saslwrapper have been added to this update
    last seen 2019-02-21
    modified 2018-12-31
    plugin id 62218
    published 2012-09-21
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=62218
    title Scientific Linux Security Update : qpid on SL6.x i386/x86_64
  • NASL family Red Hat Local Security Checks
    NASL id REDHAT-RHSA-2012-1277.NASL
    description Updated Messaging component packages that fix two security issues, multiple bugs, and add various enhancements are now available for Red Hat Enterprise MRG 2.2 for Red Hat Enterprise Linux 5. The Red Hat Security Response Team has rated this update as having moderate security impact. Common Vulnerability Scoring System (CVSS) base scores, which give detailed severity ratings, are available for each vulnerability from the CVE links in the References section. Red Hat Enterprise MRG (Messaging, Realtime, and Grid) is a next-generation IT infrastructure for enterprise computing. MRG offers increased performance, reliability, interoperability, and faster computing for enterprise customers. MRG Messaging is a high-speed reliable messaging distribution for Linux based on AMQP (Advanced Message Queuing Protocol), an open protocol standard for enterprise messaging that is designed to make mission critical messaging widely available as a standard service, and to make enterprise messaging interoperable across platforms, programming languages, and vendors. MRG Messaging includes an AMQP 0-10 messaging broker; AMQP 0-10 client libraries for C++, Java JMS, and Python; as well as persistence libraries and management tools. It was discovered that the Apache Qpid daemon (qpidd) did not allow the number of connections from clients to be restricted. A malicious client could use this flaw to open an excessive amount of connections, preventing other legitimate clients from establishing a connection to qpidd. (CVE-2012-2145) To address CVE-2012-2145, new qpidd configuration options were introduced: max-negotiate-time defines the time during which initial protocol negotiation must succeed, connection-limit-per-user and connection-limit-per-ip can be used to limit the number of connections per user and client host IP. Refer to the qpidd manual page for additional details. It was discovered that qpidd did not require authentication for 'catch-up' shadow connections created when a new broker joins a cluster. A malicious client could use this flaw to bypass client authentication. (CVE-2012-3467) This update also fixes multiple bugs and adds enhancements. Documentation for these changes will be available shortly from the Technical Notes document linked to in the References section. All users of the Messaging capabilities of Red Hat Enterprise MRG 2.2 are advised to upgrade to these updated packages, which resolve the issues and add the enhancements noted in the Red Hat Enterprise MRG 2 Technical Notes. After installing the updated packages, stop the cluster by either running 'service qpidd stop' on all nodes, or 'qpid-cluster --all-stop' on any one of the cluster nodes. Once stopped, restart the cluster with 'service qpidd start' on all nodes for the update to take effect.
    last seen 2019-02-21
    modified 2018-11-26
    plugin id 76648
    published 2014-07-22
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=76648
    title RHEL 5 : MRG Messaging (RHSA-2012:1277)
  • NASL family CentOS Local Security Checks
    NASL id CENTOS_RHSA-2012-1269.NASL
    description Updated qpid packages that fix one security issue, multiple bugs, and add various enhancements are now available for Red Hat Enterprise Linux 6. The Red Hat Security Response Team has rated this update as having moderate security impact. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available from the CVE link in the References section. Apache Qpid is a reliable, cross-platform, asynchronous messaging system that supports the Advanced Message Queuing Protocol (AMQP) in several common programming languages. It was discovered that the Qpid daemon (qpidd) did not allow the number of connections from clients to be restricted. A malicious client could use this flaw to open an excessive amount of connections, preventing other legitimate clients from establishing a connection to qpidd. (CVE-2012-2145) To address CVE-2012-2145, new qpidd configuration options were introduced: max-negotiate-time defines the time during which initial protocol negotiation must succeed, connection-limit-per-user and connection-limit-per-ip can be used to limit the number of connections per user and client host IP. Refer to the qpidd manual page for additional details. In addition, the qpid-cpp, qpid-qmf, qpid-tools, and python-qpid packages have been upgraded to upstream version 0.14, which provides support for Red Hat Enterprise MRG 2.2, as well as a number of bug fixes and enhancements over the previous version. (BZ#840053, BZ#840055, BZ#840056, BZ#840058) All users of qpid are advised to upgrade to these updated packages, which fix these issues and add these enhancements.
    last seen 2019-02-21
    modified 2018-11-10
    plugin id 62217
    published 2012-09-21
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=62217
    title CentOS 6 : qpid (CESA-2012:1269)
  • NASL family Oracle Linux Local Security Checks
    NASL id ORACLELINUX_ELSA-2012-1269.NASL
    description From Red Hat Security Advisory 2012:1269 : Updated qpid packages that fix one security issue, multiple bugs, and add various enhancements are now available for Red Hat Enterprise Linux 6. The Red Hat Security Response Team has rated this update as having moderate security impact. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available from the CVE link in the References section. Apache Qpid is a reliable, cross-platform, asynchronous messaging system that supports the Advanced Message Queuing Protocol (AMQP) in several common programming languages. It was discovered that the Qpid daemon (qpidd) did not allow the number of connections from clients to be restricted. A malicious client could use this flaw to open an excessive amount of connections, preventing other legitimate clients from establishing a connection to qpidd. (CVE-2012-2145) To address CVE-2012-2145, new qpidd configuration options were introduced: max-negotiate-time defines the time during which initial protocol negotiation must succeed, connection-limit-per-user and connection-limit-per-ip can be used to limit the number of connections per user and client host IP. Refer to the qpidd manual page for additional details. In addition, the qpid-cpp, qpid-qmf, qpid-tools, and python-qpid packages have been upgraded to upstream version 0.14, which provides support for Red Hat Enterprise MRG 2.2, as well as a number of bug fixes and enhancements over the previous version. (BZ#840053, BZ#840055, BZ#840056, BZ#840058) All users of qpid are advised to upgrade to these updated packages, which fix these issues and add these enhancements.
    last seen 2019-02-21
    modified 2018-07-18
    plugin id 68626
    published 2013-07-12
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=68626
    title Oracle Linux 6 : qpid (ELSA-2012-1269)
redhat via4
advisories
  • bugzilla
    id 840053
    title Build qpid-cpp, qpid-qmf, qpid-tools and python-qpid to support MRG 2.2 on RHEL 6.3
    oval
    AND
    • OR
      • comment Red Hat Enterprise Linux 6 Client is installed
        oval oval:com.redhat.rhsa:tst:20100842001
      • comment Red Hat Enterprise Linux 6 Server is installed
        oval oval:com.redhat.rhsa:tst:20100842002
      • comment Red Hat Enterprise Linux 6 Workstation is installed
        oval oval:com.redhat.rhsa:tst:20100842003
      • comment Red Hat Enterprise Linux 6 ComputeNode is installed
        oval oval:com.redhat.rhsa:tst:20100842004
    • OR
      • AND
        • comment python-qpid is earlier than 0:0.14-11.el6_3
          oval oval:com.redhat.rhsa:tst:20121269005
        • comment python-qpid is signed with Red Hat redhatrelease2 key
          oval oval:com.redhat.rhsa:tst:20121269006
      • AND
        • comment python-qpid-qmf is earlier than 0:0.14-14.el6_3
          oval oval:com.redhat.rhsa:tst:20121269009
        • comment python-qpid-qmf is signed with Red Hat redhatrelease2 key
          oval oval:com.redhat.rhsa:tst:20121269010
      • AND
        • comment qpid-qmf is earlier than 0:0.14-14.el6_3
          oval oval:com.redhat.rhsa:tst:20121269007
        • comment qpid-qmf is signed with Red Hat redhatrelease2 key
          oval oval:com.redhat.rhsa:tst:20121269008
      • AND
        • comment ruby-qpid-qmf is earlier than 0:0.14-14.el6_3
          oval oval:com.redhat.rhsa:tst:20121269011
        • comment ruby-qpid-qmf is signed with Red Hat redhatrelease2 key
          oval oval:com.redhat.rhsa:tst:20121269012
      • AND
        • comment qpid-tools is earlier than 0:0.14-6.el6_3
          oval oval:com.redhat.rhsa:tst:20121269013
        • comment qpid-tools is signed with Red Hat redhatrelease2 key
          oval oval:com.redhat.rhsa:tst:20121269014
      • AND
        • comment qpid-cpp-client is earlier than 0:0.14-22.el6_3
          oval oval:com.redhat.rhsa:tst:20121269017
        • comment qpid-cpp-client is signed with Red Hat redhatrelease2 key
          oval oval:com.redhat.rhsa:tst:20121269018
      • AND
        • comment qpid-cpp-client-ssl is earlier than 0:0.14-22.el6_3
          oval oval:com.redhat.rhsa:tst:20121269021
        • comment qpid-cpp-client-ssl is signed with Red Hat redhatrelease2 key
          oval oval:com.redhat.rhsa:tst:20121269022
      • AND
        • comment qpid-cpp-server is earlier than 0:0.14-22.el6_3
          oval oval:com.redhat.rhsa:tst:20121269019
        • comment qpid-cpp-server is signed with Red Hat redhatrelease2 key
          oval oval:com.redhat.rhsa:tst:20121269020
      • AND
        • comment qpid-cpp-server-ssl is earlier than 0:0.14-22.el6_3
          oval oval:com.redhat.rhsa:tst:20121269015
        • comment qpid-cpp-server-ssl is signed with Red Hat redhatrelease2 key
          oval oval:com.redhat.rhsa:tst:20121269016
    rhsa
    id RHSA-2012:1269
    released 2012-09-19
    severity Moderate
    title RHSA-2012:1269: qpid security, bug fix, and enhancement update (Moderate)
  • rhsa
    id RHSA-2012:1277
rpms
  • python-qpid-0:0.14-11.el6_3
  • python-qpid-qmf-0:0.14-14.el6_3
  • qpid-qmf-0:0.14-14.el6_3
  • ruby-qpid-qmf-0:0.14-14.el6_3
  • qpid-tools-0:0.14-6.el6_3
  • qpid-cpp-client-0:0.14-22.el6_3
  • qpid-cpp-client-ssl-0:0.14-22.el6_3
  • qpid-cpp-server-0:0.14-22.el6_3
  • qpid-cpp-server-ssl-0:0.14-22.el6_3
refmap via4
bid 55608
misc
secunia
  • 50573
  • 50698
  • 50699
xf apache-qpid-broker-dos(78730)
Last major update 21-03-2013 - 23:10
Published 28-09-2012 - 11:55
Last modified 28-08-2017 - 21:31
Back to Top