ID CVE-2012-2145
Summary Apache Qpid 0.17 and earlier does not properly restrict incoming client connections, which allows remote attackers to cause a denial of service (file descriptor consumption) via a large number of incomplete connections.
References
Vulnerable Configurations
  • cpe:2.3:a:apache:qpid:0.6:*:*:*:*:*:*:*
    cpe:2.3:a:apache:qpid:0.6:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:qpid:0.7:*:*:*:*:*:*:*
    cpe:2.3:a:apache:qpid:0.7:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:qpid:0.8:*:*:*:*:*:*:*
    cpe:2.3:a:apache:qpid:0.8:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:qpid:0.9:*:*:*:*:*:*:*
    cpe:2.3:a:apache:qpid:0.9:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:qpid:0.10:*:*:*:*:*:*:*
    cpe:2.3:a:apache:qpid:0.10:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:qpid:0.12:*:*:*:*:*:*:*
    cpe:2.3:a:apache:qpid:0.12:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:qpid:0.14:*:*:*:*:*:*:*
    cpe:2.3:a:apache:qpid:0.14:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:qpid:0.16:*:*:*:*:*:*:*
    cpe:2.3:a:apache:qpid:0.16:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:qpid:0.5:*:*:*:*:*:*:*
    cpe:2.3:a:apache:qpid:0.5:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:qpid:0.11:*:*:*:*:*:*:*
    cpe:2.3:a:apache:qpid:0.11:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:qpid:0.13:*:*:*:*:*:*:*
    cpe:2.3:a:apache:qpid:0.13:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:qpid:0.15:*:*:*:*:*:*:*
    cpe:2.3:a:apache:qpid:0.15:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:qpid:0.17:*:*:*:*:*:*:*
    cpe:2.3:a:apache:qpid:0.17:*:*:*:*:*:*:*
CVSS
Base: 5.0 (as of 29-08-2017 - 01:31)
Impact:
Exploitability:
CWE CWE-399
CAPEC
Access
VectorComplexityAuthentication
NETWORK LOW NONE
Impact
ConfidentialityIntegrityAvailability
NONE NONE PARTIAL
cvss-vector via4 AV:N/AC:L/Au:N/C:N/I:N/A:P
redhat via4
advisories
  • bugzilla
    id 840053
    title Build qpid-cpp, qpid-qmf, qpid-tools and python-qpid to support MRG 2.2 on RHEL 6.3
    oval
    AND
    • OR
      • comment Red Hat Enterprise Linux 6 Client is installed
        oval oval:com.redhat.rhba:tst:20111656001
      • comment Red Hat Enterprise Linux 6 Server is installed
        oval oval:com.redhat.rhba:tst:20111656002
      • comment Red Hat Enterprise Linux 6 Workstation is installed
        oval oval:com.redhat.rhba:tst:20111656003
      • comment Red Hat Enterprise Linux 6 ComputeNode is installed
        oval oval:com.redhat.rhba:tst:20111656004
    • OR
      • AND
        • comment python-qpid is earlier than 0:0.14-11.el6_3
          oval oval:com.redhat.rhsa:tst:20121269005
        • comment python-qpid is signed with Red Hat redhatrelease2 key
          oval oval:com.redhat.rhsa:tst:20121269006
      • AND
        • comment python-qpid-qmf is earlier than 0:0.14-14.el6_3
          oval oval:com.redhat.rhsa:tst:20121269009
        • comment python-qpid-qmf is signed with Red Hat redhatrelease2 key
          oval oval:com.redhat.rhsa:tst:20121269010
      • AND
        • comment qpid-qmf is earlier than 0:0.14-14.el6_3
          oval oval:com.redhat.rhsa:tst:20121269007
        • comment qpid-qmf is signed with Red Hat redhatrelease2 key
          oval oval:com.redhat.rhsa:tst:20121269008
      • AND
        • comment ruby-qpid-qmf is earlier than 0:0.14-14.el6_3
          oval oval:com.redhat.rhsa:tst:20121269011
        • comment ruby-qpid-qmf is signed with Red Hat redhatrelease2 key
          oval oval:com.redhat.rhsa:tst:20121269012
      • AND
        • comment qpid-tools is earlier than 0:0.14-6.el6_3
          oval oval:com.redhat.rhsa:tst:20121269013
        • comment qpid-tools is signed with Red Hat redhatrelease2 key
          oval oval:com.redhat.rhsa:tst:20121269014
      • AND
        • comment qpid-cpp-client is earlier than 0:0.14-22.el6_3
          oval oval:com.redhat.rhsa:tst:20121269017
        • comment qpid-cpp-client is signed with Red Hat redhatrelease2 key
          oval oval:com.redhat.rhsa:tst:20121269018
      • AND
        • comment qpid-cpp-client-ssl is earlier than 0:0.14-22.el6_3
          oval oval:com.redhat.rhsa:tst:20121269021
        • comment qpid-cpp-client-ssl is signed with Red Hat redhatrelease2 key
          oval oval:com.redhat.rhsa:tst:20121269022
      • AND
        • comment qpid-cpp-server is earlier than 0:0.14-22.el6_3
          oval oval:com.redhat.rhsa:tst:20121269019
        • comment qpid-cpp-server is signed with Red Hat redhatrelease2 key
          oval oval:com.redhat.rhsa:tst:20121269020
      • AND
        • comment qpid-cpp-server-ssl is earlier than 0:0.14-22.el6_3
          oval oval:com.redhat.rhsa:tst:20121269015
        • comment qpid-cpp-server-ssl is signed with Red Hat redhatrelease2 key
          oval oval:com.redhat.rhsa:tst:20121269016
    rhsa
    id RHSA-2012:1269
    released 2012-09-19
    severity Moderate
    title RHSA-2012:1269: qpid security, bug fix, and enhancement update (Moderate)
  • rhsa
    id RHSA-2012:1277
rpms
  • python-qpid-0:0.14-11.el6_3
  • python-qpid-qmf-0:0.14-14.el6_3
  • qpid-qmf-0:0.14-14.el6_3
  • ruby-qpid-qmf-0:0.14-14.el6_3
  • qpid-tools-0:0.14-6.el6_3
  • qpid-cpp-client-0:0.14-22.el6_3
  • qpid-cpp-client-ssl-0:0.14-22.el6_3
  • qpid-cpp-server-0:0.14-22.el6_3
  • qpid-cpp-server-ssl-0:0.14-22.el6_3
refmap via4
bid 55608
misc
secunia
  • 50573
  • 50698
  • 50699
xf apache-qpid-broker-dos(78730)
Last major update 29-08-2017 - 01:31
Published 28-09-2012 - 15:55
Back to Top