Описание
Apache QPID 0.14, 0.16, and earlier uses a NullAuthenticator mechanism to authenticate catch-up shadow connections to AMQP brokers, which allows remote attackers to bypass authentication.
| Релиз | Статус | Примечание |
|---|---|---|
| devel | not-affected | 0.16-7ubuntu1 |
| esm-apps/xenial | not-affected | 0.16-7ubuntu1 |
| esm-infra-legacy/trusty | DNE | trusty/esm was DNE [trusty was not-affected [0.16-7ubuntu1]] |
| hardy | DNE | |
| lucid | DNE | |
| natty | DNE | |
| oneiric | DNE | |
| precise | ignored | end of life |
| precise/esm | DNE | precise was needed |
| quantal | released | 0.16-7ubuntu1 |
Показывать по
EPSS
5 Medium
CVSS2
Связанные уязвимости
Apache QPID 0.14, 0.16, and earlier uses a NullAuthenticator mechanism to authenticate catch-up shadow connections to AMQP brokers, which allows remote attackers to bypass authentication.
Apache QPID 0.14, 0.16, and earlier uses a NullAuthenticator mechanism to authenticate catch-up shadow connections to AMQP brokers, which allows remote attackers to bypass authentication.
Apache QPID 0.14, 0.16, and earlier uses a NullAuthenticator mechanism ...
Уязвимость системы обмена программными сообщениями Apache Qpid, позволяющая злоумышленнику получить права доступа легального пользователя
EPSS
5 Medium
CVSS2