Show filters
7 Total Results
Displaying 1-7 of 7
Sort by:
Attacker Value
Unknown
CVE-2013-1909
Disclosure Date: August 23, 2013 (last updated October 05, 2023)
The Python client in Apache Qpid before 2.2 does not verify that the server hostname matches a domain name in the subject's Common Name (CN) or subjectAltName field of the X.509 certificate, which allows man-in-the-middle attackers to spoof SSL servers via an arbitrary valid certificate.
0
Attacker Value
Unknown
CVE-2012-4458
Disclosure Date: March 14, 2013 (last updated October 05, 2023)
The AMQP type decoder in Apache Qpid 0.20 and earlier allows remote attackers to cause a denial of service (memory consumption and server crash) via a large number of zero width elements in the client-properties map in a connection.start-ok message.
0
Attacker Value
Unknown
CVE-2012-4446
Disclosure Date: March 14, 2013 (last updated October 05, 2023)
The default configuration for Apache Qpid 0.20 and earlier, when the federation_tag attribute is enabled, accepts AMQP connections without checking the source user ID, which allows remote attackers to bypass authentication and have other unspecified impact via an AMQP request.
0
Attacker Value
Unknown
CVE-2012-4459
Disclosure Date: March 14, 2013 (last updated October 05, 2023)
Integer overflow in the qpid::framing::Buffer::checkAvailable function in Apache Qpid 0.20 and earlier allows remote attackers to cause a denial of service (crash) via a crafted message, which triggers an out-of-bounds read.
0
Attacker Value
Unknown
CVE-2012-4460
Disclosure Date: March 14, 2013 (last updated November 08, 2023)
The serializing/deserializing functions in the qpid::framing::Buffer class in Apache Qpid 0.20 and earlier allow remote attackers to cause a denial of service (assertion failure and daemon exit) via unspecified vectors. NOTE: this issue could also trigger an out-of-bounds read, but it might not trigger a crash.
0
Attacker Value
Unknown
CVE-2012-3467
Disclosure Date: August 27, 2012 (last updated October 05, 2023)
Apache QPID 0.14, 0.16, and earlier uses a NullAuthenticator mechanism to authenticate catch-up shadow connections to AMQP brokers, which allows remote attackers to bypass authentication.
0
Attacker Value
Unknown
CVE-2010-3083
Disclosure Date: October 12, 2010 (last updated October 04, 2023)
sys/ssl/SslSocket.cpp in qpidd in Apache Qpid, as used in Red Hat Enterprise MRG before 1.2.2 and other products, when SSL is enabled, allows remote attackers to cause a denial of service (daemon outage) by connecting to the SSL port but not participating in an SSL handshake.
0