Vulnerability Name: | CVE-2019-18609 (CCN-172448) | ||||||||||||||||||||||||||||||||||||||||||||||||
Assigned: | 2019-10-29 | ||||||||||||||||||||||||||||||||||||||||||||||||
Published: | 2019-10-29 | ||||||||||||||||||||||||||||||||||||||||||||||||
Updated: | 2022-01-01 | ||||||||||||||||||||||||||||||||||||||||||||||||
Summary: | An issue was discovered in amqp_handle_input in amqp_connection.c in rabbitmq-c 0.9.0. There is an integer overflow that leads to heap memory corruption in the handling of CONNECTION_STATE_HEADER. A rogue server could return a malicious frame header that leads to a smaller target_size value than needed. This condition is then carried on to a memcpy function that copies too much data into a heap buffer. | ||||||||||||||||||||||||||||||||||||||||||||||||
CVSS v3 Severity: | 9.8 Critical (CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H) 8.5 High (Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C)
4.6 Medium (CCN Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:U/RL:O/RC:C)
7.5 High (REDHAT Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H/E:U/RL:O/RC:C)
| ||||||||||||||||||||||||||||||||||||||||||||||||
CVSS v2 Severity: | 7.5 High (CVSS v2 Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P)
| ||||||||||||||||||||||||||||||||||||||||||||||||
Vulnerability Type: | CWE-787 CWE-122 | ||||||||||||||||||||||||||||||||||||||||||||||||
Vulnerability Consequences: | Denial of Service | ||||||||||||||||||||||||||||||||||||||||||||||||
References: | Source: MITRE Type: CNA CVE-2019-18609 Source: XF Type: UNKNOWN rabbitmqc-cve201918609-dos(172448) Source: MISC Type: Third Party Advisory https://github.com/alanxz/rabbitmq-c/blob/master/ChangeLog.md Source: CCN Type: rabbitmq-c GIT Repository lib: check frame_size is >= INT32_MAX Source: CONFIRM Type: Patch, Third Party Advisory https://github.com/alanxz/rabbitmq-c/commit/fc85be7123050b91b054e45b91c78d3241a5047a Source: MLIST Type: Mailing List, Third Party Advisory [debian-lts-announce] 20191206 [SECURITY] [DLA 2022-1] librabbitmq security update Source: FEDORA Type: Third Party Advisory FEDORA-2019-dd7c8f5435 Source: FEDORA Type: Third Party Advisory FEDORA-2019-8730b65158 Source: MISC Type: Issue Tracking, Third Party Advisory https://news.ycombinator.com/item?id=21681976 Source: GENTOO Type: Third Party Advisory GLSA-202003-07 Source: UBUNTU Type: Third Party Advisory USN-4214-1 Source: UBUNTU Type: Third Party Advisory USN-4214-2 | ||||||||||||||||||||||||||||||||||||||||||||||||
Vulnerable Configuration: | Configuration 1: Configuration 2: Configuration 3: Configuration 4: Configuration RedHat 1: Configuration RedHat 2: Configuration RedHat 3: Configuration RedHat 4: Configuration RedHat 5: Configuration RedHat 6: Configuration RedHat 7: Configuration RedHat 8: ![]() | ||||||||||||||||||||||||||||||||||||||||||||||||
Oval Definitions | |||||||||||||||||||||||||||||||||||||||||||||||||
| |||||||||||||||||||||||||||||||||||||||||||||||||
BACK |