Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2019-0223

Опубликовано: 23 апр. 2019
Источник: redhat
CVSS3: 7.4
EPSS Низкий

Описание

While investigating bug PROTON-2014, we discovered that under some circumstances Apache Qpid Proton versions 0.9 to 0.27.0 (C library and its language bindings) can connect to a peer anonymously using TLS even when configured to verify the peer certificate while used with OpenSSL versions before 1.1.0. This means that an undetected man in the middle attack could be constructed if an attacker can arrange to intercept TLS traffic.

A cryptographic weakness was discovered in qpid-proton's use of TLS. If the qpid-proton client was used without client certificates, it would accept an anonymous cipher offered by the server. A man-in-the-middle attacker could use this to silently intercept traffic that should have been encrypted.

Отчет

Red Hat OpenStack Platform 14 (and its Operational Tools) is impacted by this flaw; other supported versions are not vulnerable. Red Hat Virtualization 4 uses qpid-proton for katello-agent, which always uses client certificate authentication. Red Hat Update Infrastructure 3 is impacted by this flaw, however in its default configuration client certificate authentication is used and qpidd service, which uses qpid-proton, cannot be reach from other machines.

Меры по смягчению последствий

This attack will not work if client-certificate authentication is in place because anonymous ciphers would not then be available. Another possible mitigation is to disable anonymous ciphers on clients.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
A-MQ Interconnect 1qpid-protonAffected
Red Hat AMQ Broker 7qpid-protonNot affected
Red Hat Enterprise MRG 3qpid-protonWill not fix
Red Hat Fuse 7proton-jNot affected
Red Hat JBoss A-MQ 6proton-jOut of support scope
Red Hat JBoss Fuse 6proton-jOut of support scope
Red Hat OpenShift Application Runtimesproton-jAffected
Red Hat OpenStack Platform 8 (Liberty)qpid-protonWill not fix
Red Hat Update Infrastructure 3 for Cloud Providersqpid-protonWill not fix
Red Hat Virtualization 4redhat-virtualization-hostNot affected

Показывать по

Дополнительная информация

Статус:

Important
Дефект:
CWE-358->CWE-300
https://bugzilla.redhat.com/show_bug.cgi?id=1702439qpid-proton: TLS Man in the Middle Vulnerability

EPSS

Процентиль: 61%
0.00407
Низкий

7.4 High

CVSS3

Связанные уязвимости

CVSS3: 7.4
ubuntu
почти 7 лет назад

While investigating bug PROTON-2014, we discovered that under some circumstances Apache Qpid Proton versions 0.9 to 0.27.0 (C library and its language bindings) can connect to a peer anonymously using TLS *even when configured to verify the peer certificate* while used with OpenSSL versions before 1.1.0. This means that an undetected man in the middle attack could be constructed if an attacker can arrange to intercept TLS traffic.

CVSS3: 7.4
nvd
почти 7 лет назад

While investigating bug PROTON-2014, we discovered that under some circumstances Apache Qpid Proton versions 0.9 to 0.27.0 (C library and its language bindings) can connect to a peer anonymously using TLS *even when configured to verify the peer certificate* while used with OpenSSL versions before 1.1.0. This means that an undetected man in the middle attack could be constructed if an attacker can arrange to intercept TLS traffic.

CVSS3: 7.4
debian
почти 7 лет назад

While investigating bug PROTON-2014, we discovered that under some cir ...

suse-cvrf
почти 2 года назад

Security update for qpid-proton

CVSS3: 7.4
github
больше 3 лет назад

Withdrawn Advisory: Improper Certificate Validation in Apache Qpid Proton

EPSS

Процентиль: 61%
0.00407
Низкий

7.4 High

CVSS3