Vulnerability Name: CVE-2019-0223 (CCN-160024) Assigned: 2018-11-14 Published: 2019-04-23 Updated: 2022-04-22 Summary: While investigating bug PROTON-2014, we discovered that under some circumstances Apache Qpid Proton versions 0.9 to 0.27.0 (C library and its language bindings) can connect to a peer anonymously using TLS *even when configured to verify the peer certificate* while used with OpenSSL versions before 1.1.0. This means that an undetected man in the middle attack could be constructed if an attacker can arrange to intercept TLS traffic. CVSS v3 Severity: 7.4 High (CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N )6.4 Medium (Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N/E:U/RL:O/RC:C )Exploitability Metrics: Attack Vector (AV): NetworkAttack Complexity (AC): HighPrivileges Required (PR): NoneUser Interaction (UI): NoneScope: Scope (S): UnchangedImpact Metrics: Confidentiality (C): HighIntegrity (I): HighAvailibility (A): None
5.9 Medium (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N )5.2 Medium (CCN Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C )Exploitability Metrics: Attack Vector (AV): NetworkAttack Complexity (AC): HighPrivileges Required (PR): NoneUser Interaction (UI): NoneScope: Scope (S): UnchangedImpact Metrics: Confidentiality (C): HighIntegrity (I): NoneAvailibility (A): None
CVSS v2 Severity: 5.8 Medium (CVSS v2 Vector: AV:N/AC:M/Au:N/C:P/I:P/A:N )Exploitability Metrics: Access Vector (AV): NetworkAccess Complexity (AC): MediumAuthentication (Au): NoneImpact Metrics: Confidentiality (C): PartialIntegrity (I): PartialAvailibility (A): None
5.4 Medium (CCN CVSS v2 Vector: AV:N/AC:H/Au:N/C:C/I:N/A:N )Exploitability Metrics: Access Vector (AV): NetworkAccess Complexity (AC): HighAthentication (Au): NoneImpact Metrics: Confidentiality (C): CompleteIntegrity (I): NoneAvailibility (A): None
Vulnerability Type: CWE-noinfo Vulnerability Consequences: Obtain Information References: Source: MITRE Type: CNACVE-2019-0223 Source: MLIST Type: Mailing List, Third Party Advisory[oss-security] 20190423 [SECURITY] CVE-2019-0223: Apache Qpid Proton TLS Man in the Middle Vulnerability Source: BID Type: Broken Link108044 Source: REDHAT Type: Third Party AdvisoryRHSA-2019:0886 Source: REDHAT Type: Third Party AdvisoryRHSA-2019:1398 Source: REDHAT Type: Third Party AdvisoryRHSA-2019:1399 Source: REDHAT Type: Third Party AdvisoryRHSA-2019:1400 Source: REDHAT Type: Third Party AdvisoryRHSA-2019:2777 Source: REDHAT Type: Third Party AdvisoryRHSA-2019:2778 Source: REDHAT Type: Third Party AdvisoryRHSA-2019:2779 Source: REDHAT Type: Third Party AdvisoryRHSA-2019:2780 Source: REDHAT Type: Third Party AdvisoryRHSA-2019:2781 Source: REDHAT Type: Third Party AdvisoryRHSA-2019:2782 Source: XF Type: UNKNOWNapache-cve20190223-mitm(160024) Source: MISC Type: Issue Tracking, Vendor Advisoryhttps://issues.apache.org/jira/browse/PROTON-2014?page=com.atlassian.jira.plugin.system.issuetabpanels%3Aall-tabpanel Source: MLIST Type: Mailing List, Vendor Advisory[SECURITY] CVE-2019-0223: Apache Qpid Proton TLS Man in the Middle Vulnerability Source: MLIST Type: Mailing List, Vendor Advisory[qpid-dev] 20190423 [SECURITY] CVE-2019-0223: Apache Qpid Proton TLS Man in the Middle Vulnerability Source: MLIST Type: Mailing List, Vendor Advisory[qpid-dev] 20190423 [jira] [Updated] (PROTON-2014) [CVE-2019-0223] TLS Man in the Middle Vulnerability Source: MLIST Type: Mailing List, Patch, Vendor Advisoryqpid-commits] 20190423 [qpid-site] branch asf-site updated: update site content for CVE-2019-0223 Source: MLIST Type: Mailing List, Vendor Advisory[announce] 20190423 [SECURITY] CVE-2019-0223: Apache Qpid Proton TLS Man in the Middle Vulnerability Source: CCN Type: Apache Qpid Proton Web siteApache Qpid Proton Source: CCN Type: oss-sec Mailing List, Tue, 23 Apr 2019 11:40:05 +0100[SECURITY] CVE-2019-0223: Apache Qpid Proton TLS Man in the Middle Vulnerability Source: CCN Type: WhiteSource Vulnerability DatabaseCVE-2019-0223 Vulnerable Configuration: Configuration 1 :cpe:/a:apache:qpid:*:*:*:*:*:*:*:* (Version >= 0.9 and <= 0.27.0)Configuration 2 :cpe:/a:redhat:jboss_amq_clients_2:-:*:*:*:*:*:*:* AND cpe:/o:redhat:linux:7.0:*:*:*:*:*:*:* OR cpe:/o:redhat:linux:6.0:*:*:*:*:*:*:* Configuration 3 :cpe:/a:redhat:openstack:13:*:*:*:*:*:*:* OR cpe:/a:redhat:openstack:14:*:*:*:*:*:*:* OR cpe:/a:redhat:satellite:6.3:*:*:*:*:*:*:* OR cpe:/a:redhat:satellite:6.4:*:*:*:*:*:*:* OR cpe:/a:redhat:satellite:6.5:*:*:*:*:*:*:* OR cpe:/o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:* OR cpe:/o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:* OR cpe:/o:redhat:enterprise_linux_eus:6.7:*:*:*:*:*:*:* OR cpe:/o:redhat:enterprise_linux_eus:7.2:*:*:*:*:*:*:* OR cpe:/o:redhat:enterprise_linux_eus:7.3:*:*:*:*:*:*:* OR cpe:/o:redhat:enterprise_linux_eus:7.4:*:*:*:*:*:*:* OR cpe:/o:redhat:enterprise_linux_eus:7.5:*:*:*:*:*:*:* OR cpe:/o:redhat:enterprise_linux_eus:7.6:*:*:*:*:*:*:* OR cpe:/o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:* OR cpe:/o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:* OR cpe:/o:redhat:enterprise_linux_server_aus:5.9:*:*:*:*:*:*:* OR cpe:/o:redhat:enterprise_linux_server_aus:6.4:*:*:*:*:*:*:* OR cpe:/o:redhat:enterprise_linux_server_aus:6.5:*:*:*:*:*:*:* OR cpe:/o:redhat:enterprise_linux_server_aus:6.6:*:*:*:*:*:*:* OR cpe:/o:redhat:enterprise_linux_server_aus:7.2:*:*:*:*:*:*:* OR cpe:/o:redhat:enterprise_linux_server_aus:7.3:*:*:*:*:*:*:* OR cpe:/o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:* OR cpe:/o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:* OR cpe:/o:redhat:enterprise_linux_server_tus:7.2:*:*:*:*:*:*:* OR cpe:/o:redhat:enterprise_linux_server_tus:7.3:*:*:*:*:*:*:* OR cpe:/o:redhat:enterprise_linux_server_tus:7.4:*:*:*:*:*:*:* OR cpe:/o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:* OR cpe:/o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:* OR cpe:/o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:* Denotes that component is vulnerable Oval Definitions BACK
apache qpid *
redhat jboss amq clients 2 -
redhat linux 7.0
redhat linux 6.0
redhat openstack 13
redhat openstack 14
redhat satellite 6.3
redhat satellite 6.4
redhat satellite 6.5
redhat enterprise linux desktop 6.0
redhat enterprise linux desktop 7.0
redhat enterprise linux eus 6.7
redhat enterprise linux eus 7.2
redhat enterprise linux eus 7.3
redhat enterprise linux eus 7.4
redhat enterprise linux eus 7.5
redhat enterprise linux eus 7.6
redhat enterprise linux server 6.0
redhat enterprise linux server 7.0
redhat enterprise linux server aus 5.9
redhat enterprise linux server aus 6.4
redhat enterprise linux server aus 6.5
redhat enterprise linux server aus 6.6
redhat enterprise linux server aus 7.2
redhat enterprise linux server aus 7.3
redhat enterprise linux server aus 7.4
redhat enterprise linux server aus 7.6
redhat enterprise linux server tus 7.2
redhat enterprise linux server tus 7.3
redhat enterprise linux server tus 7.4
redhat enterprise linux server tus 7.6
redhat enterprise linux workstation 6.0
redhat enterprise linux workstation 7.0