Vulnerability Name: | CVE-2019-11287 (CCN-172184) | ||||||||||||||||
Assigned: | 2019-11-22 | ||||||||||||||||
Published: | 2019-11-22 | ||||||||||||||||
Updated: | 2022-05-15 | ||||||||||||||||
Summary: | Pivotal RabbitMQ, versions 3.7.x prior to 3.7.21 and 3.8.x prior to 3.8.1, and RabbitMQ for Pivotal Platform, 1.16.x versions prior to 1.16.7 and 1.17.x versions prior to 1.17.4, contain a web management plugin that is vulnerable to a denial of service attack. The "X-Reason" HTTP Header can be leveraged to insert a malicious Erlang format string that will expand and consume the heap, resulting in the server crashing. | ||||||||||||||||
CVSS v3 Severity: | 7.5 High (CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H) 6.5 Medium (Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C)
6.5 Medium (CCN Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C)
| ||||||||||||||||
CVSS v2 Severity: | 5.0 Medium (CVSS v2 Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P)
| ||||||||||||||||
Vulnerability Type: | CWE-134 | ||||||||||||||||
Vulnerability Consequences: | Denial of Service | ||||||||||||||||
References: | Source: MITRE Type: CNA CVE-2019-11287 Source: REDHAT Type: Third Party Advisory RHSA-2020:0078 Source: XF Type: UNKNOWN pivotal-cve201911287-dos(172184) Source: MISC Type: Exploit, Third Party Advisory https://github.com/DrunkenShells/Disclosures/tree/master/CVE-2019-11287-DoS%20via%20Heap%20Overflow-RabbitMQ%20Web%20Management%20Plugin Source: MLIST Type: Third Party Advisory [debian-lts-announce] 20210719 [SECURITY] [DLA 2710-1] rabbitmq-server security update Source: FEDORA Type: Third Party Advisory FEDORA-2019-6497f51791 Source: FEDORA Type: Third Party Advisory FEDORA-2019-74d2feb5be Source: CCN Type: Pivotal Web site CVE-2019-11287: RabbitMQ Web Management Plugin DoS via heap overflow Source: CONFIRM Type: Vendor Advisory https://pivotal.io/security/cve-2019-11287 Source: CCN Type: WhiteSource Vulnerability Database CVE-2019-11287 | ||||||||||||||||
Vulnerable Configuration: | Configuration 1: Configuration 2: Configuration 3: Configuration 4: ![]() | ||||||||||||||||
Oval Definitions | |||||||||||||||||
| |||||||||||||||||
BACK |