The qpidd broker in Apache Qpid 0.30 and earlier allows remote authenticated users to cause a denial of service (daemon crash) via an AMQP message with (1) an invalid range in a sequence set, (2) content-bearing methods other than message-transfer, or (3) a session-gap control before a corresponding session-attach.
Weaknesses in this category are typically found in functionality that processes data. Data processing is the manipulation of input to retrieve or save information.
Link | Tags |
---|---|
https://access.redhat.com/errata/RHBA-2016:1500 | third party advisory vendor advisory |
https://issues.apache.org/jira/browse/QPID-6310 | vendor advisory issue tracking |
https://packetstormsecurity.com/files/129941/Apache-Qpid-0.30-Denial-Of-Service.html | third party advisory vdb entry |
http://www.securityfocus.com/bid/72030 | third party advisory vdb entry |