Vulnerabilities > CVE-2019-18609 - Out-of-bounds Write vulnerability in multiple products

047910
CVSS 9.8 - CRITICAL
Attack vector
NETWORK
Attack complexity
LOW
Privileges required
NONE
Confidentiality impact
HIGH
Integrity impact
HIGH
Availability impact
HIGH
network
low complexity
rabbitmq-c-project
fedoraproject
canonical
debian
CWE-787
critical
nessus

Summary

An issue was discovered in amqp_handle_input in amqp_connection.c in rabbitmq-c 0.9.0. There is an integer overflow that leads to heap memory corruption in the handling of CONNECTION_STATE_HEADER. A rogue server could return a malicious frame header that leads to a smaller target_size value than needed. This condition is then carried on to a memcpy function that copies too much data into a heap buffer.

Common Weakness Enumeration (CWE)

Nessus

  • NASL familyUbuntu Local Security Checks
    NASL idUBUNTU_USN-4214-2.NASL
    descriptionUSN-4214-1 fixed a vulnerability in RabbitMQ. This update provides the corresponding updates for Ubuntu 16.04 LTS and Ubuntu 18.04 LTS. Original advisory details : It was discovered that RabbitMQ incorrectly handled certain inputs. An attacker could possibly use this issue to execute arbitrary code. Note that Tenable Network Security has extracted the preceding description block directly from the Ubuntu security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
    last seen2020-06-01
    modified2020-06-02
    plugin id132012
    published2019-12-12
    reporterUbuntu Security Notice (C) 2019 Canonical, Inc. / NASL script (C) 2019 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/132012
    titleUbuntu 16.04 LTS / 18.04 LTS : librabbitmq vulnerability (USN-4214-2)
  • NASL familyUbuntu Local Security Checks
    NASL idUBUNTU_USN-4214-1.NASL
    descriptionIt was discovered that RabbitMQ incorrectly handled certain inputs. An attacker could possibly use this issue to execute arbitrary code. Note that Tenable Network Security has extracted the preceding description block directly from the Ubuntu security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
    last seen2020-06-01
    modified2020-06-02
    plugin id131761
    published2019-12-06
    reporterUbuntu Security Notice (C) 2019 Canonical, Inc. / NASL script (C) 2019 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/131761
    titleUbuntu 19.04 / 19.10 : librabbitmq vulnerability (USN-4214-1)
  • NASL familyFedora Local Security Checks
    NASL idFEDORA_2019-8730B65158.NASL
    description**Added:** - amqp_ssl_socket_get_context can be used to get the current OpenSSL CTX* associated with a connection. **Changed:** - openssl: missing OpenSSL config is ignored as an OpenSSL init error (#523) - AMQP_DEFAULT_MAX_CHANNELS is now set to 2047 to follow current default channel limit in the RabbitMQ broker. (#513) **Fixed:** - add additional input validation to prevent integer overflow when parsing a frame header. This addresses **CVE-2019-18609**. Note that Tenable Network Security has extracted the preceding description block directly from the Fedora update system website. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
    last seen2020-06-01
    modified2020-06-02
    plugin id131841
    published2019-12-10
    reporterThis script is Copyright (C) 2019 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/131841
    titleFedora 31 : librabbitmq (2019-8730b65158)
  • NASL familyFedora Local Security Checks
    NASL idFEDORA_2019-DD7C8F5435.NASL
    description**Added:** - amqp_ssl_socket_get_context can be used to get the current OpenSSL CTX* associated with a connection. **Changed:** - openssl: missing OpenSSL config is ignored as an OpenSSL init error (#523) - AMQP_DEFAULT_MAX_CHANNELS is now set to 2047 to follow current default channel limit in the RabbitMQ broker. (#513) **Fixed:** - add additional input validation to prevent integer overflow when parsing a frame header. This addresses **CVE-2019-18609**. Note that Tenable Network Security has extracted the preceding description block directly from the Fedora update system website. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
    last seen2020-06-01
    modified2020-06-02
    plugin id131843
    published2019-12-10
    reporterThis script is Copyright (C) 2019 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/131843
    titleFedora 30 : librabbitmq (2019-dd7c8f5435)
  • NASL familyHuawei Local Security Checks
    NASL idEULEROS_SA-2020-1163.NASL
    descriptionAccording to the version of the librabbitmq package installed, the EulerOS installation on the remote host is affected by the following vulnerability : - An issue was discovered in amqp_handle_input in amqp_connection.c in rabbitmq-c 0.9.0. There is an integer overflow that leads to heap memory corruption in the handling of CONNECTION_STATE_HEADER. A rogue server could return a malicious frame header that leads to a smaller target_size value than needed. This condition is then carried on to a memcpy function that copies too much data into a heap buffer.(CVE-2019-18609) Note that Tenable Network Security has extracted the preceding description block directly from the EulerOS security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
    last seen2020-05-03
    modified2020-02-25
    plugin id133997
    published2020-02-25
    reporterThis script is Copyright (C) 2020 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/133997
    titleEulerOS 2.0 SP8 : librabbitmq (EulerOS-SA-2020-1163)
  • NASL familyGentoo Local Security Checks
    NASL idGENTOO_GLSA-202003-07.NASL
    descriptionThe remote host is affected by the vulnerability described in GLSA-202003-07 (RabbitMQ C client: Arbitrary code execution) It was discovered that RabbitMQ C client incorrectly handled certain inputs. Impact : A remote attacker, by sending a specially crafted request, could possibly execute arbitrary code with the privileges of the process or cause a Denial of Service condition. Workaround : There is no known workaround at this time.
    last seen2020-03-19
    modified2020-03-13
    plugin id134474
    published2020-03-13
    reporterThis script is Copyright (C) 2020 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/134474
    titleGLSA-202003-07 : RabbitMQ C client: Arbitrary code execution
  • NASL familyDebian Local Security Checks
    NASL idDEBIAN_DLA-2022.NASL
    descriptionIt was discovered that there was an integer overflow vulnerability in librabbitmq, a library for robust messaging between applications and servers. For Debian 8
    last seen2020-06-01
    modified2020-06-02
    plugin id131780
    published2019-12-09
    reporterThis script is Copyright (C) 2019 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/131780
    titleDebian DLA-2022-1 : librabbitmq security update
  • NASL familyHuawei Local Security Checks
    NASL idEULEROS_SA-2020-1116.NASL
    descriptionAccording to the version of the librabbitmq package installed, the EulerOS installation on the remote host is affected by the following vulnerability : - An issue was discovered in amqp_handle_input in amqp_connection.c in rabbitmq-c 0.9.0. There is an integer overflow that leads to heap memory corruption in the handling of CONNECTION_STATE_HEADER. A rogue server could return a malicious frame header that leads to a smaller target_size value than needed. This condition is then carried on to a memcpy function that copies too much data into a heap buffer.(CVE-2019-18609) Note that Tenable Network Security has extracted the preceding description block directly from the EulerOS security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
    last seen2020-05-06
    modified2020-02-24
    plugin id133917
    published2020-02-24
    reporterThis script is Copyright (C) 2020 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/133917
    titleEulerOS 2.0 SP5 : librabbitmq (EulerOS-SA-2020-1116)