ID |
CVE-2012-2145
|
Summary |
Apache Qpid 0.17 and earlier does not properly restrict incoming client connections, which allows remote attackers to cause a denial of service (file descriptor consumption) via a large number of incomplete connections. |
References |
|
Vulnerable Configurations |
-
cpe:2.3:a:apache:qpid:0.6:*:*:*:*:*:*:*
cpe:2.3:a:apache:qpid:0.6:*:*:*:*:*:*:*
-
cpe:2.3:a:apache:qpid:0.7:*:*:*:*:*:*:*
cpe:2.3:a:apache:qpid:0.7:*:*:*:*:*:*:*
-
cpe:2.3:a:apache:qpid:0.8:*:*:*:*:*:*:*
cpe:2.3:a:apache:qpid:0.8:*:*:*:*:*:*:*
-
cpe:2.3:a:apache:qpid:0.9:*:*:*:*:*:*:*
cpe:2.3:a:apache:qpid:0.9:*:*:*:*:*:*:*
-
cpe:2.3:a:apache:qpid:0.10:*:*:*:*:*:*:*
cpe:2.3:a:apache:qpid:0.10:*:*:*:*:*:*:*
-
cpe:2.3:a:apache:qpid:0.12:*:*:*:*:*:*:*
cpe:2.3:a:apache:qpid:0.12:*:*:*:*:*:*:*
-
cpe:2.3:a:apache:qpid:0.14:*:*:*:*:*:*:*
cpe:2.3:a:apache:qpid:0.14:*:*:*:*:*:*:*
-
cpe:2.3:a:apache:qpid:0.16:*:*:*:*:*:*:*
cpe:2.3:a:apache:qpid:0.16:*:*:*:*:*:*:*
-
cpe:2.3:a:apache:qpid:0.5:*:*:*:*:*:*:*
cpe:2.3:a:apache:qpid:0.5:*:*:*:*:*:*:*
-
cpe:2.3:a:apache:qpid:0.11:*:*:*:*:*:*:*
cpe:2.3:a:apache:qpid:0.11:*:*:*:*:*:*:*
-
cpe:2.3:a:apache:qpid:0.13:*:*:*:*:*:*:*
cpe:2.3:a:apache:qpid:0.13:*:*:*:*:*:*:*
-
cpe:2.3:a:apache:qpid:0.15:*:*:*:*:*:*:*
cpe:2.3:a:apache:qpid:0.15:*:*:*:*:*:*:*
-
cpe:2.3:a:apache:qpid:0.17:*:*:*:*:*:*:*
cpe:2.3:a:apache:qpid:0.17:*:*:*:*:*:*:*
|
CVSS |
Base: | 5.0 (as of 29-08-2017 - 01:31) |
Impact: | |
Exploitability: | |
|
CWE |
CWE-399 |
CAPEC |
|
Access |
Vector | Complexity | Authentication |
NETWORK |
LOW |
NONE |
|
Impact |
Confidentiality | Integrity | Availability |
NONE |
NONE |
PARTIAL |
|
cvss-vector
via4
|
AV:N/AC:L/Au:N/C:N/I:N/A:P
|
redhat
via4
|
advisories | bugzilla | id | 840053 | title | Build qpid-cpp, qpid-qmf, qpid-tools and python-qpid to support MRG 2.2 on RHEL 6.3 |
| oval | OR | comment | Red Hat Enterprise Linux must be installed | oval | oval:com.redhat.rhba:tst:20070304026 |
AND | comment | Red Hat Enterprise Linux 6 is installed | oval | oval:com.redhat.rhba:tst:20111656003 |
OR | AND | comment | python-qpid is earlier than 0:0.14-11.el6_3 | oval | oval:com.redhat.rhsa:tst:20121269001 |
comment | python-qpid is signed with Red Hat redhatrelease2 key | oval | oval:com.redhat.rhsa:tst:20121269002 |
|
AND | comment | python-qpid-qmf is earlier than 0:0.14-14.el6_3 | oval | oval:com.redhat.rhsa:tst:20121269003 |
comment | python-qpid-qmf is signed with Red Hat redhatrelease2 key | oval | oval:com.redhat.rhsa:tst:20121269004 |
|
AND | comment | qpid-qmf is earlier than 0:0.14-14.el6_3 | oval | oval:com.redhat.rhsa:tst:20121269005 |
comment | qpid-qmf is signed with Red Hat redhatrelease2 key | oval | oval:com.redhat.rhsa:tst:20121269006 |
|
AND | comment | ruby-qpid-qmf is earlier than 0:0.14-14.el6_3 | oval | oval:com.redhat.rhsa:tst:20121269007 |
comment | ruby-qpid-qmf is signed with Red Hat redhatrelease2 key | oval | oval:com.redhat.rhsa:tst:20121269008 |
|
AND | comment | qpid-tools is earlier than 0:0.14-6.el6_3 | oval | oval:com.redhat.rhsa:tst:20121269009 |
comment | qpid-tools is signed with Red Hat redhatrelease2 key | oval | oval:com.redhat.rhsa:tst:20121269010 |
|
AND | comment | qpid-cpp-client is earlier than 0:0.14-22.el6_3 | oval | oval:com.redhat.rhsa:tst:20121269011 |
comment | qpid-cpp-client is signed with Red Hat redhatrelease2 key | oval | oval:com.redhat.rhsa:tst:20121269012 |
|
AND | comment | qpid-cpp-client-ssl is earlier than 0:0.14-22.el6_3 | oval | oval:com.redhat.rhsa:tst:20121269013 |
comment | qpid-cpp-client-ssl is signed with Red Hat redhatrelease2 key | oval | oval:com.redhat.rhsa:tst:20121269014 |
|
AND | comment | qpid-cpp-server is earlier than 0:0.14-22.el6_3 | oval | oval:com.redhat.rhsa:tst:20121269015 |
comment | qpid-cpp-server is signed with Red Hat redhatrelease2 key | oval | oval:com.redhat.rhsa:tst:20121269016 |
|
AND | comment | qpid-cpp-server-ssl is earlier than 0:0.14-22.el6_3 | oval | oval:com.redhat.rhsa:tst:20121269017 |
comment | qpid-cpp-server-ssl is signed with Red Hat redhatrelease2 key | oval | oval:com.redhat.rhsa:tst:20121269018 |
|
|
|
|
| rhsa | id | RHSA-2012:1269 | released | 2012-09-19 | severity | Moderate | title | RHSA-2012:1269: qpid security, bug fix, and enhancement update (Moderate) |
|
| rpms | - python-qpid-0:0.14-11.el6_3
- python-qpid-qmf-0:0.14-14.el6_3
- qpid-cpp-client-0:0.14-22.el6_3
- qpid-cpp-client-ssl-0:0.14-22.el6_3
- qpid-cpp-debuginfo-0:0.14-22.el6_3
- qpid-cpp-server-0:0.14-22.el6_3
- qpid-cpp-server-ssl-0:0.14-22.el6_3
- qpid-qmf-0:0.14-14.el6_3
- qpid-qmf-debuginfo-0:0.14-14.el6_3
- qpid-tools-0:0.14-6.el6_3
- ruby-qpid-qmf-0:0.14-14.el6_3
- mrg-release-0:2.2.0-1.el5
- python-qpid-0:0.14-11.el5
- python-qpid-qmf-0:0.14-14.el5
- qpid-cpp-client-0:0.14-22.el5
- qpid-cpp-client-devel-0:0.14-22.el5
- qpid-cpp-client-devel-docs-0:0.14-22.el5
- qpid-cpp-client-rdma-0:0.14-22.el5
- qpid-cpp-client-ssl-0:0.14-22.el5
- qpid-cpp-mrg-debuginfo-0:0.14-22.el5
- qpid-cpp-server-0:0.14-22.el5
- qpid-cpp-server-cluster-0:0.14-22.el5
- qpid-cpp-server-devel-0:0.14-22.el5
- qpid-cpp-server-rdma-0:0.14-22.el5
- qpid-cpp-server-ssl-0:0.14-22.el5
- qpid-cpp-server-store-0:0.14-22.el5
- qpid-cpp-server-xml-0:0.14-22.el5
- qpid-java-client-0:0.18-2.el5
- qpid-java-common-0:0.18-2.el5
- qpid-java-example-0:0.18-2.el5
- qpid-jca-0:0.18-2.el5
- qpid-jca-xarecovery-0:0.18-2.el5
- qpid-qmf-0:0.14-14.el5
- qpid-qmf-debuginfo-0:0.14-14.el5
- qpid-qmf-devel-0:0.14-14.el5
- qpid-tools-0:0.14-6.el5
- ruby-qpid-qmf-0:0.14-14.el5
|
|
refmap
via4
|
bid | 55608 | misc | | secunia | | xf | apache-qpid-broker-dos(78730) |
|
Last major update |
29-08-2017 - 01:31 |
Published |
28-09-2012 - 15:55 |
Last modified |
29-08-2017 - 01:31 |