CVE-2023-46120

The RabbitMQ Java client library allows Java and JVM-based applications to connect to and interact with RabbitMQ nodes. `maxBodyLebgth` was not used when receiving Message objects. Attackers could send a very large Message causing a memory overflow and triggering an OOM Error. Users of RabbitMQ may suffer from DoS attacks from RabbitMQ Java client which will ultimately exhaust the memory of the consumer. This vulnerability was patched in version 5.18.0.
Configurations

Configuration 1 (hide)

cpe:2.3:a:vmware:rabbitmq_java_client:*:*:*:*:*:*:*:*

History

21 Nov 2024, 08:27

Type Values Removed Values Added
References () https://github.com/rabbitmq/rabbitmq-java-client/commit/714aae602dcae6cb4b53cadf009323ebac313cc8 - Patch () https://github.com/rabbitmq/rabbitmq-java-client/commit/714aae602dcae6cb4b53cadf009323ebac313cc8 - Patch
References () https://github.com/rabbitmq/rabbitmq-java-client/issues/1062 - Issue Tracking, Patch () https://github.com/rabbitmq/rabbitmq-java-client/issues/1062 - Issue Tracking, Patch
References () https://github.com/rabbitmq/rabbitmq-java-client/releases/tag/v5.18.0 - Release Notes () https://github.com/rabbitmq/rabbitmq-java-client/releases/tag/v5.18.0 - Release Notes
References () https://github.com/rabbitmq/rabbitmq-java-client/security/advisories/GHSA-mm8h-8587-p46h - Exploit, Vendor Advisory () https://github.com/rabbitmq/rabbitmq-java-client/security/advisories/GHSA-mm8h-8587-p46h - Exploit, Vendor Advisory
CVSS v2 : unknown
v3 : 7.5
v2 : unknown
v3 : 4.9

01 Nov 2023, 16:42

Type Values Removed Values Added
CWE CWE-400
CPE cpe:2.3:a:vmware:rabbitmq_java_client:*:*:*:*:*:*:*:*
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 7.5
First Time Vmware
Vmware rabbitmq Java Client
References (MISC) https://github.com/rabbitmq/rabbitmq-java-client/issues/1062 - (MISC) https://github.com/rabbitmq/rabbitmq-java-client/issues/1062 - Issue Tracking, Patch
References (MISC) https://github.com/rabbitmq/rabbitmq-java-client/security/advisories/GHSA-mm8h-8587-p46h - (MISC) https://github.com/rabbitmq/rabbitmq-java-client/security/advisories/GHSA-mm8h-8587-p46h - Exploit, Vendor Advisory
References (MISC) https://github.com/rabbitmq/rabbitmq-java-client/commit/714aae602dcae6cb4b53cadf009323ebac313cc8 - (MISC) https://github.com/rabbitmq/rabbitmq-java-client/commit/714aae602dcae6cb4b53cadf009323ebac313cc8 - Patch
References (MISC) https://github.com/rabbitmq/rabbitmq-java-client/releases/tag/v5.18.0 - (MISC) https://github.com/rabbitmq/rabbitmq-java-client/releases/tag/v5.18.0 - Release Notes

25 Oct 2023, 18:17

Type Values Removed Values Added
New CVE

Information

Published : 2023-10-25 18:17

Updated : 2024-11-21 08:27


NVD link : CVE-2023-46120

Mitre link : CVE-2023-46120

CVE.ORG link : CVE-2023-46120


JSON object : View

Products Affected

vmware

  • rabbitmq_java_client
CWE
CWE-400

Uncontrolled Resource Consumption