A Denial of Service vulnerability was found in Apache Qpid Dispatch Router versions 0.7.0 and 0.8.0. To exploit this vulnerability, a remote user must be able to establish an AMQP connection to the Qpid Dispatch Router and send a specifically crafted AMQP frame which will cause it to segfault and shut down.
References
Link | Resource |
---|---|
http://www.securityfocus.com/bid/103067 | Broken Link Third Party Advisory VDB Entry |
https://issues.apache.org/jira/browse/DISPATCH-924 | Patch Third Party Advisory |
http://www.securityfocus.com/bid/103067 | Broken Link Third Party Advisory VDB Entry |
https://issues.apache.org/jira/browse/DISPATCH-924 | Patch Third Party Advisory |
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 03:15
Type | Values Removed | Values Added |
---|---|---|
References | () http://www.securityfocus.com/bid/103067 - Broken Link, Third Party Advisory, VDB Entry | |
References | () https://issues.apache.org/jira/browse/DISPATCH-924 - Patch, Third Party Advisory |
Information
Published : 2018-02-13 22:29
Updated : 2024-11-21 03:15
NVD link : CVE-2017-15699
Mitre link : CVE-2017-15699
CVE.ORG link : CVE-2017-15699
JSON object : View
Products Affected
apache
- qpid_dispatch
CWE
CWE-20
Improper Input Validation