The AMQP 0-8, 0-9, 0-91, and 0-10 connection handling in Apache Qpid Java before 6.0.3 might allow remote attackers to bypass authentication and consequently perform actions via vectors related to connection state logging.
When an actor claims to have a given identity, the product does not prove or insufficiently proves that the claim is correct.
Link | Tags |
---|---|
http://www.securityfocus.com/archive/1/538508/100/0/threaded | mailing list vdb entry third party advisory |
http://www.securitytracker.com/id/1035983 | vdb entry third party advisory broken link |
https://svn.apache.org/viewvc?view=revision&revision=1743393 | patch vendor advisory |
https://svn.apache.org/viewvc?view=revision&revision=1743161 | patch vendor advisory |
http://packetstormsecurity.com/files/137216/Apache-Qpid-Java-Broker-6.0.2-Authentication-Bypass.html | vdb entry third party advisory |
http://mail-archives.apache.org/mod_mbox/qpid-users/201605.mbox/%3CCAFEMS4tXDKYxKVMmU0zTb_7uzduoUS4_RePnUwz1tj%2BGQLNw5Q%40mail.gmail.com%3E | mailing list vendor advisory |
https://issues.apache.org/jira/browse/QPID-7257 | issue tracking vendor advisory |