Vulnerability Name:

CVE-2019-0223 (CCN-160024)

Assigned:2018-11-14
Published:2019-04-23
Updated:2022-04-22
Summary:While investigating bug PROTON-2014, we discovered that under some circumstances Apache Qpid Proton versions 0.9 to 0.27.0 (C library and its language bindings) can connect to a peer anonymously using TLS *even when configured to verify the peer certificate* while used with OpenSSL versions before 1.1.0. This means that an undetected man in the middle attack could be constructed if an attacker can arrange to intercept TLS traffic.
CVSS v3 Severity:7.4 High (CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N)
6.4 Medium (Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N/E:U/RL:O/RC:C)
Exploitability Metrics:Attack Vector (AV): Network
Attack Complexity (AC): High
Privileges Required (PR): None
User Interaction (UI): None
Scope:Scope (S): Unchanged
Impact Metrics:Confidentiality (C): High
Integrity (I): High
Availibility (A): None
5.9 Medium (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N)
5.2 Medium (CCN Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C)
Exploitability Metrics:Attack Vector (AV): Network
Attack Complexity (AC): High
Privileges Required (PR): None
User Interaction (UI): None
Scope:Scope (S): Unchanged
Impact Metrics:Confidentiality (C): High
Integrity (I): None
Availibility (A): None
CVSS v2 Severity:5.8 Medium (CVSS v2 Vector: AV:N/AC:M/Au:N/C:P/I:P/A:N)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Medium
Authentication (Au): None
Impact Metrics:Confidentiality (C): Partial
Integrity (I): Partial
Availibility (A): None
5.4 Medium (CCN CVSS v2 Vector: AV:N/AC:H/Au:N/C:C/I:N/A:N)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): High
Athentication (Au): None
Impact Metrics:Confidentiality (C): Complete
Integrity (I): None
Availibility (A): None
Vulnerability Type:CWE-noinfo
Vulnerability Consequences:Obtain Information
References:Source: MITRE
Type: CNA
CVE-2019-0223

Source: MLIST
Type: Mailing List, Third Party Advisory
[oss-security] 20190423 [SECURITY] CVE-2019-0223: Apache Qpid Proton TLS Man in the Middle Vulnerability

Source: BID
Type: Broken Link
108044

Source: REDHAT
Type: Third Party Advisory
RHSA-2019:0886

Source: REDHAT
Type: Third Party Advisory
RHSA-2019:1398

Source: REDHAT
Type: Third Party Advisory
RHSA-2019:1399

Source: REDHAT
Type: Third Party Advisory
RHSA-2019:1400

Source: REDHAT
Type: Third Party Advisory
RHSA-2019:2777

Source: REDHAT
Type: Third Party Advisory
RHSA-2019:2778

Source: REDHAT
Type: Third Party Advisory
RHSA-2019:2779

Source: REDHAT
Type: Third Party Advisory
RHSA-2019:2780

Source: REDHAT
Type: Third Party Advisory
RHSA-2019:2781

Source: REDHAT
Type: Third Party Advisory
RHSA-2019:2782

Source: XF
Type: UNKNOWN
apache-cve20190223-mitm(160024)

Source: MISC
Type: Issue Tracking, Vendor Advisory
https://issues.apache.org/jira/browse/PROTON-2014?page=com.atlassian.jira.plugin.system.issuetabpanels%3Aall-tabpanel

Source: MLIST
Type: Mailing List, Vendor Advisory
[SECURITY] CVE-2019-0223: Apache Qpid Proton TLS Man in the Middle Vulnerability

Source: MLIST
Type: Mailing List, Vendor Advisory
[qpid-dev] 20190423 [SECURITY] CVE-2019-0223: Apache Qpid Proton TLS Man in the Middle Vulnerability

Source: MLIST
Type: Mailing List, Vendor Advisory
[qpid-dev] 20190423 [jira] [Updated] (PROTON-2014) [CVE-2019-0223] TLS Man in the Middle Vulnerability

Source: MLIST
Type: Mailing List, Patch, Vendor Advisory
qpid-commits] 20190423 [qpid-site] branch asf-site updated: update site content for CVE-2019-0223

Source: MLIST
Type: Mailing List, Vendor Advisory
[announce] 20190423 [SECURITY] CVE-2019-0223: Apache Qpid Proton TLS Man in the Middle Vulnerability

Source: CCN
Type: Apache Qpid Proton Web site
Apache Qpid Proton

Source: CCN
Type: oss-sec Mailing List, Tue, 23 Apr 2019 11:40:05 +0100
[SECURITY] CVE-2019-0223: Apache Qpid Proton TLS Man in the Middle Vulnerability

Source: CCN
Type: WhiteSource Vulnerability Database
CVE-2019-0223

Vulnerable Configuration:Configuration 1:
  • cpe:/a:apache:qpid:*:*:*:*:*:*:*:* (Version >= 0.9 and <= 0.27.0)

  • Configuration 2:
  • cpe:/a:redhat:jboss_amq_clients_2:-:*:*:*:*:*:*:*
  • AND
  • cpe:/o:redhat:linux:7.0:*:*:*:*:*:*:*
  • OR cpe:/o:redhat:linux:6.0:*:*:*:*:*:*:*

  • Configuration 3:
  • cpe:/a:redhat:openstack:13:*:*:*:*:*:*:*
  • OR cpe:/a:redhat:openstack:14:*:*:*:*:*:*:*
  • OR cpe:/a:redhat:satellite:6.3:*:*:*:*:*:*:*
  • OR cpe:/a:redhat:satellite:6.4:*:*:*:*:*:*:*
  • OR cpe:/a:redhat:satellite:6.5:*:*:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux_eus:6.7:*:*:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux_eus:7.2:*:*:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux_eus:7.3:*:*:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux_eus:7.4:*:*:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux_eus:7.5:*:*:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux_eus:7.6:*:*:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux_server_aus:5.9:*:*:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux_server_aus:6.4:*:*:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux_server_aus:6.5:*:*:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux_server_aus:6.6:*:*:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux_server_aus:7.2:*:*:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux_server_aus:7.3:*:*:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux_server_tus:7.2:*:*:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux_server_tus:7.3:*:*:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux_server_tus:7.4:*:*:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*

  • * Denotes that component is vulnerable
    Oval Definitions
    Definition IDClassTitleLast Modified
    oval:com.ubuntu.cosmic:def:20190223000
    V
    CVE-2019-0223 on Ubuntu 18.10 (cosmic) - medium.
    2019-04-23
    oval:com.ubuntu.bionic:def:201902230000000
    V
    CVE-2019-0223 on Ubuntu 18.04 LTS (bionic) - medium.
    2019-04-23
    oval:com.ubuntu.bionic:def:20190223000
    V
    CVE-2019-0223 on Ubuntu 18.04 LTS (bionic) - medium.
    2019-04-23
    oval:com.ubuntu.xenial:def:201902230000000
    V
    CVE-2019-0223 on Ubuntu 16.04 LTS (xenial) - medium.
    2019-04-23
    oval:com.ubuntu.xenial:def:20190223000
    V
    CVE-2019-0223 on Ubuntu 16.04 LTS (xenial) - medium.
    2019-04-23
    oval:com.ubuntu.disco:def:201902230000000
    V
    CVE-2019-0223 on Ubuntu 19.04 (disco) - medium.
    2019-04-23
    oval:com.ubuntu.cosmic:def:201902230000000
    V
    CVE-2019-0223 on Ubuntu 18.10 (cosmic) - medium.
    2019-04-23
    BACK
    apache qpid *
    redhat jboss amq clients 2 -
    redhat linux 7.0
    redhat linux 6.0
    redhat openstack 13
    redhat openstack 14
    redhat satellite 6.3
    redhat satellite 6.4
    redhat satellite 6.5
    redhat enterprise linux desktop 6.0
    redhat enterprise linux desktop 7.0
    redhat enterprise linux eus 6.7
    redhat enterprise linux eus 7.2
    redhat enterprise linux eus 7.3
    redhat enterprise linux eus 7.4
    redhat enterprise linux eus 7.5
    redhat enterprise linux eus 7.6
    redhat enterprise linux server 6.0
    redhat enterprise linux server 7.0
    redhat enterprise linux server aus 5.9
    redhat enterprise linux server aus 6.4
    redhat enterprise linux server aus 6.5
    redhat enterprise linux server aus 6.6
    redhat enterprise linux server aus 7.2
    redhat enterprise linux server aus 7.3
    redhat enterprise linux server aus 7.4
    redhat enterprise linux server aus 7.6
    redhat enterprise linux server tus 7.2
    redhat enterprise linux server tus 7.3
    redhat enterprise linux server tus 7.4
    redhat enterprise linux server tus 7.6
    redhat enterprise linux workstation 6.0
    redhat enterprise linux workstation 7.0