Количество 7
Количество 7
CVE-2019-0223
While investigating bug PROTON-2014, we discovered that under some circumstances Apache Qpid Proton versions 0.9 to 0.27.0 (C library and its language bindings) can connect to a peer anonymously using TLS *even when configured to verify the peer certificate* while used with OpenSSL versions before 1.1.0. This means that an undetected man in the middle attack could be constructed if an attacker can arrange to intercept TLS traffic.
CVE-2019-0223
While investigating bug PROTON-2014, we discovered that under some circumstances Apache Qpid Proton versions 0.9 to 0.27.0 (C library and its language bindings) can connect to a peer anonymously using TLS *even when configured to verify the peer certificate* while used with OpenSSL versions before 1.1.0. This means that an undetected man in the middle attack could be constructed if an attacker can arrange to intercept TLS traffic.
CVE-2019-0223
While investigating bug PROTON-2014, we discovered that under some circumstances Apache Qpid Proton versions 0.9 to 0.27.0 (C library and its language bindings) can connect to a peer anonymously using TLS *even when configured to verify the peer certificate* while used with OpenSSL versions before 1.1.0. This means that an undetected man in the middle attack could be constructed if an attacker can arrange to intercept TLS traffic.
CVE-2019-0223
While investigating bug PROTON-2014, we discovered that under some cir ...
SUSE-SU-2024:1074-1
Security update for qpid-proton
GHSA-5h6x-m52p-23ph
Withdrawn Advisory: Improper Certificate Validation in Apache Qpid Proton
BDU:2019-02465
Уязвимость библиотеки Apache Qpid Proton, связанная с ошибками процедуры подтверждения подлинности сертификата, позволяющая нарушителю реализовать атаку «человек посередине» и осуществить перехват TLS-трафика
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
|---|---|---|---|---|
CVE-2019-0223 While investigating bug PROTON-2014, we discovered that under some circumstances Apache Qpid Proton versions 0.9 to 0.27.0 (C library and its language bindings) can connect to a peer anonymously using TLS *even when configured to verify the peer certificate* while used with OpenSSL versions before 1.1.0. This means that an undetected man in the middle attack could be constructed if an attacker can arrange to intercept TLS traffic. | CVSS3: 7.4 | 0% Низкий | почти 7 лет назад | |
CVE-2019-0223 While investigating bug PROTON-2014, we discovered that under some circumstances Apache Qpid Proton versions 0.9 to 0.27.0 (C library and its language bindings) can connect to a peer anonymously using TLS *even when configured to verify the peer certificate* while used with OpenSSL versions before 1.1.0. This means that an undetected man in the middle attack could be constructed if an attacker can arrange to intercept TLS traffic. | CVSS3: 7.4 | 0% Низкий | почти 7 лет назад | |
CVE-2019-0223 While investigating bug PROTON-2014, we discovered that under some circumstances Apache Qpid Proton versions 0.9 to 0.27.0 (C library and its language bindings) can connect to a peer anonymously using TLS *even when configured to verify the peer certificate* while used with OpenSSL versions before 1.1.0. This means that an undetected man in the middle attack could be constructed if an attacker can arrange to intercept TLS traffic. | CVSS3: 7.4 | 0% Низкий | почти 7 лет назад | |
CVE-2019-0223 While investigating bug PROTON-2014, we discovered that under some cir ... | CVSS3: 7.4 | 0% Низкий | почти 7 лет назад | |
SUSE-SU-2024:1074-1 Security update for qpid-proton | 0% Низкий | почти 2 года назад | ||
GHSA-5h6x-m52p-23ph Withdrawn Advisory: Improper Certificate Validation in Apache Qpid Proton | CVSS3: 7.4 | 0% Низкий | больше 3 лет назад | |
BDU:2019-02465 Уязвимость библиотеки Apache Qpid Proton, связанная с ошибками процедуры подтверждения подлинности сертификата, позволяющая нарушителю реализовать атаку «человек посередине» и осуществить перехват TLS-трафика | CVSS3: 7.4 | 0% Низкий | почти 7 лет назад |
Уязвимостей на страницу