sys/ssl/SslSocket.cpp in qpidd in Apache Qpid, as used in Red Hat Enterprise MRG before 1.2.2 and other products, when SSL is enabled, allows remote attackers to cause a denial of service (daemon outage) by connecting to the SSL port but not participating in an SSL handshake.
References
Configurations
Configuration 1 (hide)
AND |
|
History
21 Nov 2024, 01:17
Type | Values Removed | Values Added |
---|---|---|
References | () http://secunia.com/advisories/41710 - | |
References | () http://svn.apache.org/viewvc/qpid/trunk/qpid/cpp/src/qpid/sys/ssl/SslSocket.cpp?r1=790291&r2=790290&pathrev=790291&view=patch - Patch | |
References | () http://www.openwall.com/lists/oss-security/2010/10/08/1 - | |
References | () http://www.redhat.com/support/errata/RHSA-2010-0756.html - Patch, Vendor Advisory | |
References | () http://www.redhat.com/support/errata/RHSA-2010-0757.html - Patch, Vendor Advisory | |
References | () https://bugzilla.redhat.com/show_bug.cgi?id=632657 - |
Information
Published : 2010-10-12 21:00
Updated : 2024-11-21 01:17
NVD link : CVE-2010-3083
Mitre link : CVE-2010-3083
CVE.ORG link : CVE-2010-3083
JSON object : View
Products Affected
redhat
- enterprise_mrg
apache
- qpid
CWE