ID CVE-2012-4458
Summary The AMQP type decoder in Apache Qpid 0.20 and earlier allows remote attackers to cause a denial of service (memory consumption and server crash) via a large number of zero width elements in the client-properties map in a connection.start-ok message.
References
Vulnerable Configurations
  • cpe:2.3:a:apache:qpid:0.5:*:*:*:*:*:*:*
    cpe:2.3:a:apache:qpid:0.5:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:qpid:0.6:*:*:*:*:*:*:*
    cpe:2.3:a:apache:qpid:0.6:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:qpid:0.7:*:*:*:*:*:*:*
    cpe:2.3:a:apache:qpid:0.7:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:qpid:0.8:*:*:*:*:*:*:*
    cpe:2.3:a:apache:qpid:0.8:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:qpid:0.9:*:*:*:*:*:*:*
    cpe:2.3:a:apache:qpid:0.9:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:qpid:0.10:*:*:*:*:*:*:*
    cpe:2.3:a:apache:qpid:0.10:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:qpid:0.11:*:*:*:*:*:*:*
    cpe:2.3:a:apache:qpid:0.11:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:qpid:0.12:*:*:*:*:*:*:*
    cpe:2.3:a:apache:qpid:0.12:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:qpid:0.13:*:*:*:*:*:*:*
    cpe:2.3:a:apache:qpid:0.13:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:qpid:0.14:*:*:*:*:*:*:*
    cpe:2.3:a:apache:qpid:0.14:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:qpid:0.15:*:*:*:*:*:*:*
    cpe:2.3:a:apache:qpid:0.15:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:qpid:0.16:*:*:*:*:*:*:*
    cpe:2.3:a:apache:qpid:0.16:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:qpid:0.17:*:*:*:*:*:*:*
    cpe:2.3:a:apache:qpid:0.17:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:qpid:0.18:*:*:*:*:*:*:*
    cpe:2.3:a:apache:qpid:0.18:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:qpid:0.19:*:*:*:*:*:*:*
    cpe:2.3:a:apache:qpid:0.19:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:qpid:0.20:*:*:*:*:*:*:*
    cpe:2.3:a:apache:qpid:0.20:*:*:*:*:*:*:*
CVSS
Base: 5.0 (as of 19-03-2013 - 16:49)
Impact:
Exploitability:
CWE CWE-189
CAPEC
Access
VectorComplexityAuthentication
NETWORK LOW NONE
Impact
ConfidentialityIntegrityAvailability
NONE NONE PARTIAL
cvss-vector via4 AV:N/AC:L/Au:N/C:N/I:N/A:P
redhat via4
advisories
  • rhsa
    id RHSA-2013:0561
  • rhsa
    id RHSA-2013:0562
rpms
  • cumin-messaging-0:0.1.1-2.el5
  • mrg-release-0:2.3.0-1.el5
  • python-qpid-0:0.18-4.el5
  • python-qpid-qmf-0:0.18-15.el5
  • python-saslwrapper-0:0.18-1.el5
  • qpid-cpp-client-0:0.18-14.el5
  • qpid-cpp-client-devel-0:0.18-14.el5
  • qpid-cpp-client-devel-docs-0:0.18-14.el5
  • qpid-cpp-client-rdma-0:0.18-14.el5
  • qpid-cpp-client-ssl-0:0.18-14.el5
  • qpid-cpp-mrg-debuginfo-0:0.18-14.el5
  • qpid-cpp-server-0:0.18-14.el5
  • qpid-cpp-server-cluster-0:0.18-14.el5
  • qpid-cpp-server-devel-0:0.18-14.el5
  • qpid-cpp-server-rdma-0:0.18-14.el5
  • qpid-cpp-server-ssl-0:0.18-14.el5
  • qpid-cpp-server-store-0:0.18-14.el5
  • qpid-cpp-server-xml-0:0.18-14.el5
  • qpid-java-client-0:0.18-7.el5
  • qpid-java-common-0:0.18-7.el5
  • qpid-java-example-0:0.18-7.el5
  • qpid-jca-0:0.18-8.el5
  • qpid-jca-xarecovery-0:0.18-8.el5
  • qpid-qmf-0:0.18-15.el5
  • qpid-qmf-debuginfo-0:0.18-15.el5
  • qpid-qmf-devel-0:0.18-15.el5
  • qpid-tests-0:0.18-2.el5
  • qpid-tools-0:0.18-8.el5
  • rhm-docs-0:0.18-2.el5
  • ruby-qpid-qmf-0:0.18-15.el5
  • ruby-saslwrapper-0:0.18-1.el5
  • saslwrapper-0:0.18-1.el5
  • saslwrapper-debuginfo-0:0.18-1.el5
  • saslwrapper-devel-0:0.18-1.el5
  • cumin-messaging-0:0.1.1-2.el6
  • mrg-release-0:2.3.0-1.el6
  • python-qpid-0:0.18-4.el6
  • python-qpid-qmf-0:0.18-15.el6
  • python-saslwrapper-0:0.18-1.el6_3
  • qpid-cpp-client-0:0.18-14.el6
  • qpid-cpp-client-devel-0:0.18-14.el6
  • qpid-cpp-client-devel-docs-0:0.18-14.el6
  • qpid-cpp-client-rdma-0:0.18-14.el6
  • qpid-cpp-client-ssl-0:0.18-14.el6
  • qpid-cpp-debuginfo-0:0.18-14.el6
  • qpid-cpp-server-0:0.18-14.el6
  • qpid-cpp-server-cluster-0:0.18-14.el6
  • qpid-cpp-server-devel-0:0.18-14.el6
  • qpid-cpp-server-rdma-0:0.18-14.el6
  • qpid-cpp-server-ssl-0:0.18-14.el6
  • qpid-cpp-server-store-0:0.18-14.el6
  • qpid-cpp-server-xml-0:0.18-14.el6
  • qpid-java-client-0:0.18-7.el6
  • qpid-java-common-0:0.18-7.el6
  • qpid-java-example-0:0.18-7.el6
  • qpid-jca-0:0.18-8.el6
  • qpid-jca-xarecovery-0:0.18-8.el6
  • qpid-qmf-0:0.18-15.el6
  • qpid-qmf-debuginfo-0:0.18-15.el6
  • qpid-qmf-devel-0:0.18-15.el6
  • qpid-tests-0:0.18-2.el6
  • qpid-tools-0:0.18-8.el6
  • rhm-docs-0:0.18-2.el6
  • ruby-qpid-qmf-0:0.18-15.el6
  • ruby-saslwrapper-0:0.18-1.el6_3
  • rubygem-rake-0:0.8.7-2.1.el6
  • rubygems-0:1.8.16-1.el6
  • saslwrapper-0:0.18-1.el6_3
  • saslwrapper-debuginfo-0:0.18-1.el6_3
  • saslwrapper-devel-0:0.18-1.el6_3
  • xerces-c-0:3.0.1-20.el6
  • xerces-c-debuginfo-0:3.0.1-20.el6
  • xerces-c-devel-0:3.0.1-20.el6
  • xerces-c-doc-0:3.0.1-20.el6
  • xqilla-0:2.2.3-8.el6
  • xqilla-debuginfo-0:2.2.3-8.el6
  • xqilla-devel-0:2.2.3-8.el6
  • xqilla-doc-0:2.2.3-8.el6
refmap via4
confirm
misc https://bugzilla.redhat.com/show_bug.cgi?id=861234
secunia 52516
Last major update 19-03-2013 - 16:49
Published 14-03-2013 - 03:10
Last modified 19-03-2013 - 16:49
Back to Top