Vulnerabilities > Apache > Qpid > 0.6
DATE | CVE | VULNERABILITY TITLE | RISK |
---|---|---|---|
2018-02-21 | CVE-2015-0203 | Data Processing Errors vulnerability in Apache Qpid The qpidd broker in Apache Qpid 0.30 and earlier allows remote authenticated users to cause a denial of service (daemon crash) via an AMQP message with (1) an invalid range in a sequence set, (2) content-bearing methods other than message-transfer, or (3) a session-gap control before a corresponding session-attach. | 4.0 |
2017-10-30 | CVE-2015-0224 | Data Processing Errors vulnerability in Apache Qpid qpidd in Apache Qpid 0.30 and earlier allows remote attackers to cause a denial of service (daemon crash) via a crafted protocol sequence set. | 7.5 |
2015-02-02 | CVE-2015-0223 | Permissions, Privileges, and Access Controls vulnerability in Apache Qpid Unspecified vulnerability in Apache Qpid 0.30 and earlier allows remote attackers to bypass access restrictions on qpidd via unknown vectors, related to 0-10 connection handling. | 5.0 |
2013-08-23 | CVE-2013-1909 | Improper Input Validation vulnerability in multiple products The Python client in Apache Qpid before 2.2 does not verify that the server hostname matches a domain name in the subject's Common Name (CN) or subjectAltName field of the X.509 certificate, which allows man-in-the-middle attackers to spoof SSL servers via an arbitrary valid certificate. | 5.8 |
2013-03-14 | CVE-2012-4459 | Numeric Errors vulnerability in Apache Qpid Integer overflow in the qpid::framing::Buffer::checkAvailable function in Apache Qpid 0.20 and earlier allows remote attackers to cause a denial of service (crash) via a crafted message, which triggers an out-of-bounds read. | 5.0 |
2013-03-14 | CVE-2012-4458 | Numeric Errors vulnerability in Apache Qpid The AMQP type decoder in Apache Qpid 0.20 and earlier allows remote attackers to cause a denial of service (memory consumption and server crash) via a large number of zero width elements in the client-properties map in a connection.start-ok message. | 5.0 |
2013-03-14 | CVE-2012-4446 | Improper Authentication vulnerability in Apache Qpid The default configuration for Apache Qpid 0.20 and earlier, when the federation_tag attribute is enabled, accepts AMQP connections without checking the source user ID, which allows remote attackers to bypass authentication and have other unspecified impact via an AMQP request. | 6.8 |
2012-09-28 | CVE-2012-2145 | Resource Management Errors vulnerability in Apache Qpid Apache Qpid 0.17 and earlier does not properly restrict incoming client connections, which allows remote attackers to cause a denial of service (file descriptor consumption) via a large number of incomplete connections. | 5.0 |
2012-08-27 | CVE-2012-3467 | Improper Authentication vulnerability in Apache Qpid Apache QPID 0.14, 0.16, and earlier uses a NullAuthenticator mechanism to authenticate catch-up shadow connections to AMQP brokers, which allows remote attackers to bypass authentication. | 5.0 |
2010-10-12 | CVE-2010-3083 | sys/ssl/SslSocket.cpp in qpidd in Apache Qpid, as used in Red Hat Enterprise MRG before 1.2.2 and other products, when SSL is enabled, allows remote attackers to cause a denial of service (daemon outage) by connecting to the SSL port but not participating in an SSL handshake. | 4.3 |