It was found that the Apache ActiveMQ client before 5.14.5 exposed a remote shutdown command in the ActiveMQConnection class. An attacker logged into a compromised broker could use this flaw to achieve denial of service on a connected client.
The product does not perform any authentication for functionality that requires a provable user identity or consumes a significant amount of resources.
The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly.
Link | Tags |
---|---|
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2015-7559 | issue tracking third party advisory patch |
https://issues.apache.org/jira/browse/AMQ-6470 | patch vendor advisory |