ID CVE-2012-2145
Summary Apache Qpid 0.17 and earlier does not properly restrict incoming client connections, which allows remote attackers to cause a denial of service (file descriptor consumption) via a large number of incomplete connections.
References
Vulnerable Configurations
  • cpe:2.3:a:apache:qpid:0.6:*:*:*:*:*:*:*
    cpe:2.3:a:apache:qpid:0.6:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:qpid:0.7:*:*:*:*:*:*:*
    cpe:2.3:a:apache:qpid:0.7:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:qpid:0.8:*:*:*:*:*:*:*
    cpe:2.3:a:apache:qpid:0.8:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:qpid:0.9:*:*:*:*:*:*:*
    cpe:2.3:a:apache:qpid:0.9:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:qpid:0.10:*:*:*:*:*:*:*
    cpe:2.3:a:apache:qpid:0.10:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:qpid:0.12:*:*:*:*:*:*:*
    cpe:2.3:a:apache:qpid:0.12:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:qpid:0.14:*:*:*:*:*:*:*
    cpe:2.3:a:apache:qpid:0.14:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:qpid:0.16:*:*:*:*:*:*:*
    cpe:2.3:a:apache:qpid:0.16:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:qpid:0.5:*:*:*:*:*:*:*
    cpe:2.3:a:apache:qpid:0.5:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:qpid:0.11:*:*:*:*:*:*:*
    cpe:2.3:a:apache:qpid:0.11:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:qpid:0.13:*:*:*:*:*:*:*
    cpe:2.3:a:apache:qpid:0.13:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:qpid:0.15:*:*:*:*:*:*:*
    cpe:2.3:a:apache:qpid:0.15:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:qpid:0.17:*:*:*:*:*:*:*
    cpe:2.3:a:apache:qpid:0.17:*:*:*:*:*:*:*
CVSS
Base: 5.0 (as of 29-08-2017 - 01:31)
Impact:
Exploitability:
CWE CWE-399
CAPEC
Access
VectorComplexityAuthentication
NETWORK LOW NONE
Impact
ConfidentialityIntegrityAvailability
NONE NONE PARTIAL
cvss-vector via4 AV:N/AC:L/Au:N/C:N/I:N/A:P
redhat via4
advisories
  • bugzilla
    id 840053
    title Build qpid-cpp, qpid-qmf, qpid-tools and python-qpid to support MRG 2.2 on RHEL 6.3
    oval
    OR
    • comment Red Hat Enterprise Linux must be installed
      oval oval:com.redhat.rhba:tst:20070304026
    • AND
      • comment Red Hat Enterprise Linux 6 is installed
        oval oval:com.redhat.rhba:tst:20111656003
      • OR
        • AND
          • comment python-qpid is earlier than 0:0.14-11.el6_3
            oval oval:com.redhat.rhsa:tst:20121269001
          • comment python-qpid is signed with Red Hat redhatrelease2 key
            oval oval:com.redhat.rhsa:tst:20121269002
        • AND
          • comment python-qpid-qmf is earlier than 0:0.14-14.el6_3
            oval oval:com.redhat.rhsa:tst:20121269003
          • comment python-qpid-qmf is signed with Red Hat redhatrelease2 key
            oval oval:com.redhat.rhsa:tst:20121269004
        • AND
          • comment qpid-qmf is earlier than 0:0.14-14.el6_3
            oval oval:com.redhat.rhsa:tst:20121269005
          • comment qpid-qmf is signed with Red Hat redhatrelease2 key
            oval oval:com.redhat.rhsa:tst:20121269006
        • AND
          • comment ruby-qpid-qmf is earlier than 0:0.14-14.el6_3
            oval oval:com.redhat.rhsa:tst:20121269007
          • comment ruby-qpid-qmf is signed with Red Hat redhatrelease2 key
            oval oval:com.redhat.rhsa:tst:20121269008
        • AND
          • comment qpid-tools is earlier than 0:0.14-6.el6_3
            oval oval:com.redhat.rhsa:tst:20121269009
          • comment qpid-tools is signed with Red Hat redhatrelease2 key
            oval oval:com.redhat.rhsa:tst:20121269010
        • AND
          • comment qpid-cpp-client is earlier than 0:0.14-22.el6_3
            oval oval:com.redhat.rhsa:tst:20121269011
          • comment qpid-cpp-client is signed with Red Hat redhatrelease2 key
            oval oval:com.redhat.rhsa:tst:20121269012
        • AND
          • comment qpid-cpp-client-ssl is earlier than 0:0.14-22.el6_3
            oval oval:com.redhat.rhsa:tst:20121269013
          • comment qpid-cpp-client-ssl is signed with Red Hat redhatrelease2 key
            oval oval:com.redhat.rhsa:tst:20121269014
        • AND
          • comment qpid-cpp-server is earlier than 0:0.14-22.el6_3
            oval oval:com.redhat.rhsa:tst:20121269015
          • comment qpid-cpp-server is signed with Red Hat redhatrelease2 key
            oval oval:com.redhat.rhsa:tst:20121269016
        • AND
          • comment qpid-cpp-server-ssl is earlier than 0:0.14-22.el6_3
            oval oval:com.redhat.rhsa:tst:20121269017
          • comment qpid-cpp-server-ssl is signed with Red Hat redhatrelease2 key
            oval oval:com.redhat.rhsa:tst:20121269018
    rhsa
    id RHSA-2012:1269
    released 2012-09-19
    severity Moderate
    title RHSA-2012:1269: qpid security, bug fix, and enhancement update (Moderate)
  • rhsa
    id RHSA-2012:1277
rpms
  • python-qpid-0:0.14-11.el6_3
  • python-qpid-qmf-0:0.14-14.el6_3
  • qpid-cpp-client-0:0.14-22.el6_3
  • qpid-cpp-client-ssl-0:0.14-22.el6_3
  • qpid-cpp-debuginfo-0:0.14-22.el6_3
  • qpid-cpp-server-0:0.14-22.el6_3
  • qpid-cpp-server-ssl-0:0.14-22.el6_3
  • qpid-qmf-0:0.14-14.el6_3
  • qpid-qmf-debuginfo-0:0.14-14.el6_3
  • qpid-tools-0:0.14-6.el6_3
  • ruby-qpid-qmf-0:0.14-14.el6_3
  • mrg-release-0:2.2.0-1.el5
  • python-qpid-0:0.14-11.el5
  • python-qpid-qmf-0:0.14-14.el5
  • qpid-cpp-client-0:0.14-22.el5
  • qpid-cpp-client-devel-0:0.14-22.el5
  • qpid-cpp-client-devel-docs-0:0.14-22.el5
  • qpid-cpp-client-rdma-0:0.14-22.el5
  • qpid-cpp-client-ssl-0:0.14-22.el5
  • qpid-cpp-mrg-debuginfo-0:0.14-22.el5
  • qpid-cpp-server-0:0.14-22.el5
  • qpid-cpp-server-cluster-0:0.14-22.el5
  • qpid-cpp-server-devel-0:0.14-22.el5
  • qpid-cpp-server-rdma-0:0.14-22.el5
  • qpid-cpp-server-ssl-0:0.14-22.el5
  • qpid-cpp-server-store-0:0.14-22.el5
  • qpid-cpp-server-xml-0:0.14-22.el5
  • qpid-java-client-0:0.18-2.el5
  • qpid-java-common-0:0.18-2.el5
  • qpid-java-example-0:0.18-2.el5
  • qpid-jca-0:0.18-2.el5
  • qpid-jca-xarecovery-0:0.18-2.el5
  • qpid-qmf-0:0.14-14.el5
  • qpid-qmf-debuginfo-0:0.14-14.el5
  • qpid-qmf-devel-0:0.14-14.el5
  • qpid-tools-0:0.14-6.el5
  • ruby-qpid-qmf-0:0.14-14.el5
refmap via4
bid 55608
misc
secunia
  • 50573
  • 50698
  • 50699
xf apache-qpid-broker-dos(78730)
Last major update 29-08-2017 - 01:31
Published 28-09-2012 - 15:55
Last modified 29-08-2017 - 01:31
Back to Top