The Cluster::deliveredEvent function in cluster/Cluster.cpp in Apache Qpid, as used in Red Hat Enterprise MRG before 1.3 and other products, allows remote attackers to cause a denial of service (daemon crash and cluster outage) via invalid AMQP data.
References
Link | Resource |
---|---|
http://secunia.com/advisories/41710 | Vendor Advisory |
http://secunia.com/advisories/41812 | Vendor Advisory |
http://svn.apache.org/viewvc?revision=785788&view=revision | Patch |
http://www.vupen.com/english/advisories/2010/2684 | Vendor Advisory |
https://bugzilla.redhat.com/show_bug.cgi?id=642373 | |
https://rhn.redhat.com/errata/RHSA-2010-0773.html | Patch Vendor Advisory |
https://rhn.redhat.com/errata/RHSA-2010-0774.html | Patch Vendor Advisory |
http://secunia.com/advisories/41710 | Vendor Advisory |
http://secunia.com/advisories/41812 | Vendor Advisory |
http://svn.apache.org/viewvc?revision=785788&view=revision | Patch |
http://www.vupen.com/english/advisories/2010/2684 | Vendor Advisory |
https://bugzilla.redhat.com/show_bug.cgi?id=642373 | |
https://rhn.redhat.com/errata/RHSA-2010-0773.html | Patch Vendor Advisory |
https://rhn.redhat.com/errata/RHSA-2010-0774.html | Patch Vendor Advisory |
Configurations
Configuration 1 (hide)
AND |
|
History
21 Nov 2024, 01:10
Type | Values Removed | Values Added |
---|---|---|
References | () http://secunia.com/advisories/41710 - Vendor Advisory | |
References | () http://secunia.com/advisories/41812 - Vendor Advisory | |
References | () http://svn.apache.org/viewvc?revision=785788&view=revision - Patch | |
References | () http://www.vupen.com/english/advisories/2010/2684 - Vendor Advisory | |
References | () https://bugzilla.redhat.com/show_bug.cgi?id=642373 - | |
References | () https://rhn.redhat.com/errata/RHSA-2010-0773.html - Patch, Vendor Advisory | |
References | () https://rhn.redhat.com/errata/RHSA-2010-0774.html - Patch, Vendor Advisory |
15 Jul 2021, 19:16
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:a:redhat:enterprise_mrg:1.0:*:*:*:*:*:*:* cpe:2.3:a:redhat:enterprise_mrg:1.1.1:*:*:*:*:*:*:* cpe:2.3:a:redhat:enterprise_mrg:1.2:*:*:*:*:*:*:* cpe:2.3:a:redhat:enterprise_mrg:*:*:*:*:*:*:*:* cpe:2.3:a:redhat:enterprise_mrg:1.0.2:*:*:*:*:*:*:* cpe:2.3:a:redhat:enterprise_mrg:1.0.1:*:*:*:*:*:*:* cpe:2.3:a:redhat:enterprise_mrg:1.1.2:*:*:*:*:*:*:* |
cpe:2.3:o:redhat:enterprise_mrg:1.0.1:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_mrg:1.1.1:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_mrg:*:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_mrg:1.0.2:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_mrg:1.0:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_mrg:1.2:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_mrg:1.1.2:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_mrg:1.0.3:*:*:*:*:*:*:* |
Information
Published : 2010-10-18 17:00
Updated : 2024-11-21 01:10
NVD link : CVE-2009-5005
Mitre link : CVE-2009-5005
CVE.ORG link : CVE-2009-5005
JSON object : View
Products Affected
apache
- qpid
redhat
- enterprise_mrg
CWE