Apache

Qpid Broker-j

8 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 2.92%
  • Veröffentlicht 06.03.2019 18:29:00
  • Zuletzt bearbeitet 21.11.2024 04:16:28

A Denial of Service vulnerability was found in Apache Qpid Broker-J versions 6.0.0-7.0.6 (inclusive) and 7.1.0 which allows an unauthenticated attacker to crash the broker instance by sending specially crafted commands using AMQP protocol versions be...

  • EPSS 0.91%
  • Veröffentlicht 20.06.2018 01:29:03
  • Zuletzt bearbeitet 21.11.2024 04:13:07

A Denial of Service vulnerability was found in Apache Qpid Broker-J versions 7.0.0-7.0.4 when AMQP protocols 0-8, 0-9 or 0-91 are used to publish messages with size greater than allowed maximum message size limit (100MB by default). The broker crashe...

  • EPSS 1.21%
  • Veröffentlicht 09.02.2018 14:29:00
  • Zuletzt bearbeitet 21.11.2024 03:59:34

A Denial of Service vulnerability was found in Apache Qpid Broker-J 7.0.0 in functionality for authentication of connections for AMQP protocols 0-8, 0-9, 0-91 and 0-10 when PLAIN or XOAUTH2 SASL mechanism is used. The vulnerability allows unauthentic...

  • EPSS 2.28%
  • Veröffentlicht 01.12.2017 15:29:00
  • Zuletzt bearbeitet 20.04.2025 01:37:25

In Apache Qpid Broker-J versions 6.1.0 through 6.1.4 (inclusive) the broker does not properly enforce a maximum frame size in AMQP 1.0 frames. A remote unauthenticated attacker could exploit this to cause the broker to exhaust all available memory an...

  • EPSS 3.09%
  • Veröffentlicht 01.12.2017 15:29:00
  • Zuletzt bearbeitet 20.04.2025 01:37:25

In Apache Qpid Broker-J 0.18 through 0.32, if the broker is configured with different authentication providers on different ports one of which is an HTTP port, then the broker can be tricked by a remote unauthenticated attacker connecting to the HTTP...

  • EPSS 0.49%
  • Veröffentlicht 15.05.2017 14:29:00
  • Zuletzt bearbeitet 20.04.2025 01:37:25

The Apache Qpid Broker for Java can be configured to use different so called AuthenticationProviders to handle user authentication. Among the choices are the SCRAM-SHA-1 and SCRAM-SHA-256 AuthenticationProvider types. It was discovered that these Aut...

  • EPSS 0.47%
  • Veröffentlicht 01.06.2016 20:59:07
  • Zuletzt bearbeitet 12.04.2025 10:46:40

The AMQP 0-8, 0-9, 0-91, and 0-10 connection handling in Apache Qpid Java before 6.0.3 might allow remote attackers to bypass authentication and consequently perform actions via vectors related to connection state logging.

  • EPSS 0.99%
  • Veröffentlicht 01.06.2016 20:59:05
  • Zuletzt bearbeitet 12.04.2025 10:46:40

PlainSaslServer.java in Apache Qpid Java before 6.0.3, when the broker is configured to allow plaintext passwords, allows remote attackers to cause a denial of service (broker termination) via a crafted authentication attempt, which triggers an uncau...