CVE-2015-0224

qpidd in Apache Qpid 0.30 and earlier allows remote attackers to cause a denial of service (daemon crash) via a crafted protocol sequence set. NOTE: this vulnerability exists because of an incomplete fix for CVE-2015-0203.
References
Link Resource
http://lists.fedoraproject.org/pipermail/package-announce/2016-March/178606.html Issue Tracking Third Party Advisory
http://mail-archives.apache.org/mod_mbox/www-announce/201501.mbox/%3C54C60497.5060504%40apache.org%3E
http://packetstormsecurity.com/files/130105/Apache-Qpid-0.30-Crash.html Issue Tracking Third Party Advisory VDB Entry
http://rhn.redhat.com/errata/RHSA-2015-0660.html Issue Tracking Third Party Advisory
http://rhn.redhat.com/errata/RHSA-2015-0661.html Issue Tracking Third Party Advisory
http://rhn.redhat.com/errata/RHSA-2015-0662.html Issue Tracking Third Party Advisory
http://rhn.redhat.com/errata/RHSA-2015-0707.html Issue Tracking Third Party Advisory
http://www.securityfocus.com/archive/1/534545/100/0/threaded
http://www.securityfocus.com/bid/72317 Issue Tracking Third Party Advisory VDB Entry
http://www.securitytracker.com/id/1031872 Issue Tracking Third Party Advisory VDB Entry
https://access.redhat.com/errata/RHBA-2016:1500
https://access.redhat.com/errata/RHSA-2015:0708 Issue Tracking Third Party Advisory
https://bugzilla.redhat.com/show_bug.cgi?id=1186302 Issue Tracking Third Party Advisory
https://issues.apache.org/jira/browse/QPID-6310 Issue Tracking Patch Vendor Advisory
http://lists.fedoraproject.org/pipermail/package-announce/2016-March/178606.html Issue Tracking Third Party Advisory
http://mail-archives.apache.org/mod_mbox/www-announce/201501.mbox/%3C54C60497.5060504%40apache.org%3E
http://packetstormsecurity.com/files/130105/Apache-Qpid-0.30-Crash.html Issue Tracking Third Party Advisory VDB Entry
http://rhn.redhat.com/errata/RHSA-2015-0660.html Issue Tracking Third Party Advisory
http://rhn.redhat.com/errata/RHSA-2015-0661.html Issue Tracking Third Party Advisory
http://rhn.redhat.com/errata/RHSA-2015-0662.html Issue Tracking Third Party Advisory
http://rhn.redhat.com/errata/RHSA-2015-0707.html Issue Tracking Third Party Advisory
http://www.securityfocus.com/archive/1/534545/100/0/threaded
http://www.securityfocus.com/bid/72317 Issue Tracking Third Party Advisory VDB Entry
http://www.securitytracker.com/id/1031872 Issue Tracking Third Party Advisory VDB Entry
https://access.redhat.com/errata/RHBA-2016:1500
https://access.redhat.com/errata/RHSA-2015:0708 Issue Tracking Third Party Advisory
https://bugzilla.redhat.com/show_bug.cgi?id=1186302 Issue Tracking Third Party Advisory
https://issues.apache.org/jira/browse/QPID-6310 Issue Tracking Patch Vendor Advisory
Configurations

Configuration 1 (hide)

cpe:2.3:a:apache:qpid:*:*:*:*:*:*:*:*

History

21 Nov 2024, 02:22

Type Values Removed Values Added
References () http://lists.fedoraproject.org/pipermail/package-announce/2016-March/178606.html - Issue Tracking, Third Party Advisory () http://lists.fedoraproject.org/pipermail/package-announce/2016-March/178606.html - Issue Tracking, Third Party Advisory
References () http://mail-archives.apache.org/mod_mbox/www-announce/201501.mbox/%3C54C60497.5060504%40apache.org%3E - () http://mail-archives.apache.org/mod_mbox/www-announce/201501.mbox/%3C54C60497.5060504%40apache.org%3E -
References () http://packetstormsecurity.com/files/130105/Apache-Qpid-0.30-Crash.html - Issue Tracking, Third Party Advisory, VDB Entry () http://packetstormsecurity.com/files/130105/Apache-Qpid-0.30-Crash.html - Issue Tracking, Third Party Advisory, VDB Entry
References () http://rhn.redhat.com/errata/RHSA-2015-0660.html - Issue Tracking, Third Party Advisory () http://rhn.redhat.com/errata/RHSA-2015-0660.html - Issue Tracking, Third Party Advisory
References () http://rhn.redhat.com/errata/RHSA-2015-0661.html - Issue Tracking, Third Party Advisory () http://rhn.redhat.com/errata/RHSA-2015-0661.html - Issue Tracking, Third Party Advisory
References () http://rhn.redhat.com/errata/RHSA-2015-0662.html - Issue Tracking, Third Party Advisory () http://rhn.redhat.com/errata/RHSA-2015-0662.html - Issue Tracking, Third Party Advisory
References () http://rhn.redhat.com/errata/RHSA-2015-0707.html - Issue Tracking, Third Party Advisory () http://rhn.redhat.com/errata/RHSA-2015-0707.html - Issue Tracking, Third Party Advisory
References () http://www.securityfocus.com/archive/1/534545/100/0/threaded - () http://www.securityfocus.com/archive/1/534545/100/0/threaded -
References () http://www.securityfocus.com/bid/72317 - Issue Tracking, Third Party Advisory, VDB Entry () http://www.securityfocus.com/bid/72317 - Issue Tracking, Third Party Advisory, VDB Entry
References () http://www.securitytracker.com/id/1031872 - Issue Tracking, Third Party Advisory, VDB Entry () http://www.securitytracker.com/id/1031872 - Issue Tracking, Third Party Advisory, VDB Entry
References () https://access.redhat.com/errata/RHBA-2016:1500 - () https://access.redhat.com/errata/RHBA-2016:1500 -
References () https://access.redhat.com/errata/RHSA-2015:0708 - Issue Tracking, Third Party Advisory () https://access.redhat.com/errata/RHSA-2015:0708 - Issue Tracking, Third Party Advisory
References () https://bugzilla.redhat.com/show_bug.cgi?id=1186302 - Issue Tracking, Third Party Advisory () https://bugzilla.redhat.com/show_bug.cgi?id=1186302 - Issue Tracking, Third Party Advisory
References () https://issues.apache.org/jira/browse/QPID-6310 - Issue Tracking, Patch, Vendor Advisory () https://issues.apache.org/jira/browse/QPID-6310 - Issue Tracking, Patch, Vendor Advisory

07 Nov 2023, 02:23

Type Values Removed Values Added
Summary qpidd in Apache Qpid 0.30 and earlier allows remote attackers to cause a denial of service (daemon crash) via a crafted protocol sequence set. NOTE: this vulnerability exists because of an incomplete fix for CVE-2015-0203. qpidd in Apache Qpid 0.30 and earlier allows remote attackers to cause a denial of service (daemon crash) via a crafted protocol sequence set. NOTE: this vulnerability exists because of an incomplete fix for CVE-2015-0203.

Information

Published : 2017-10-30 14:29

Updated : 2024-11-21 02:22


NVD link : CVE-2015-0224

Mitre link : CVE-2015-0224

CVE.ORG link : CVE-2015-0224


JSON object : View

Products Affected

apache

  • qpid
CWE
CWE-19

Data Processing Errors