CVE-2019-0223

While investigating bug PROTON-2014, we discovered that under some circumstances Apache Qpid Proton versions 0.9 to 0.27.0 (C library and its language bindings) can connect to a peer anonymously using TLS *even when configured to verify the peer certificate* while used with OpenSSL versions before 1.1.0. This means that an undetected man in the middle attack could be constructed if an attacker can arrange to intercept TLS traffic.
References
Link Resource
http://www.openwall.com/lists/oss-security/2019/04/23/4 Mailing List Third Party Advisory
http://www.securityfocus.com/bid/108044 Broken Link
https://access.redhat.com/errata/RHSA-2019:0886 Third Party Advisory
https://access.redhat.com/errata/RHSA-2019:1398 Third Party Advisory
https://access.redhat.com/errata/RHSA-2019:1399 Third Party Advisory
https://access.redhat.com/errata/RHSA-2019:1400 Third Party Advisory
https://access.redhat.com/errata/RHSA-2019:2777 Third Party Advisory
https://access.redhat.com/errata/RHSA-2019:2778 Third Party Advisory
https://access.redhat.com/errata/RHSA-2019:2779 Third Party Advisory
https://access.redhat.com/errata/RHSA-2019:2780 Third Party Advisory
https://access.redhat.com/errata/RHSA-2019:2781 Third Party Advisory
https://access.redhat.com/errata/RHSA-2019:2782 Third Party Advisory
https://issues.apache.org/jira/browse/PROTON-2014?page=com.atlassian.jira.plugin.system.issuetabpanels%3Aall-tabpanel Issue Tracking Vendor Advisory
https://lists.apache.org/thread.html/008ee5e78e5a090e1fcc5f6617f425e4e51d59f03d3eda2dd006df9f%40%3Cusers.qpid.apache.org%3E
https://lists.apache.org/thread.html/3adb2f020f705b4fd453982992a68cd10f9d5ac728b699efdb73c1f5%40%3Cdev.qpid.apache.org%3E
https://lists.apache.org/thread.html/49c83f0acce5ceaeffca51714ec2ba0f0199bcb8f99167181bba441b%40%3Cdev.qpid.apache.org%3E
https://lists.apache.org/thread.html/914424e4d798a340f523b6169aaf39b626971d9bb00fcdeb1d5d6c0d%40%3Ccommits.qpid.apache.org%3E
https://lists.apache.org/thread.html/d9c9a882a292e2defaed1f954528c916fb64497ce57db652727e39b0%40%3Cannounce.apache.org%3E
http://www.openwall.com/lists/oss-security/2019/04/23/4 Mailing List Third Party Advisory
http://www.securityfocus.com/bid/108044 Broken Link
https://access.redhat.com/errata/RHSA-2019:0886 Third Party Advisory
https://access.redhat.com/errata/RHSA-2019:1398 Third Party Advisory
https://access.redhat.com/errata/RHSA-2019:1399 Third Party Advisory
https://access.redhat.com/errata/RHSA-2019:1400 Third Party Advisory
https://access.redhat.com/errata/RHSA-2019:2777 Third Party Advisory
https://access.redhat.com/errata/RHSA-2019:2778 Third Party Advisory
https://access.redhat.com/errata/RHSA-2019:2779 Third Party Advisory
https://access.redhat.com/errata/RHSA-2019:2780 Third Party Advisory
https://access.redhat.com/errata/RHSA-2019:2781 Third Party Advisory
https://access.redhat.com/errata/RHSA-2019:2782 Third Party Advisory
https://issues.apache.org/jira/browse/PROTON-2014?page=com.atlassian.jira.plugin.system.issuetabpanels%3Aall-tabpanel Issue Tracking Vendor Advisory
https://lists.apache.org/thread.html/008ee5e78e5a090e1fcc5f6617f425e4e51d59f03d3eda2dd006df9f%40%3Cusers.qpid.apache.org%3E
https://lists.apache.org/thread.html/3adb2f020f705b4fd453982992a68cd10f9d5ac728b699efdb73c1f5%40%3Cdev.qpid.apache.org%3E
https://lists.apache.org/thread.html/49c83f0acce5ceaeffca51714ec2ba0f0199bcb8f99167181bba441b%40%3Cdev.qpid.apache.org%3E
https://lists.apache.org/thread.html/914424e4d798a340f523b6169aaf39b626971d9bb00fcdeb1d5d6c0d%40%3Ccommits.qpid.apache.org%3E
https://lists.apache.org/thread.html/d9c9a882a292e2defaed1f954528c916fb64497ce57db652727e39b0%40%3Cannounce.apache.org%3E
Configurations

Configuration 1 (hide)

cpe:2.3:a:apache:qpid:*:*:*:*:*:*:*:*

Configuration 2 (hide)

AND
cpe:2.3:a:redhat:jboss_amq_clients_2:-:*:*:*:*:*:*:*
OR cpe:2.3:o:redhat:linux:6.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:linux:7.0:*:*:*:*:*:*:*

Configuration 3 (hide)

OR cpe:2.3:a:redhat:openstack:13:*:*:*:*:*:*:*
cpe:2.3:a:redhat:openstack:14:*:*:*:*:*:*:*
cpe:2.3:a:redhat:satellite:6.3:*:*:*:*:*:*:*
cpe:2.3:a:redhat:satellite:6.4:*:*:*:*:*:*:*
cpe:2.3:a:redhat:satellite:6.5:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_eus:6.7:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_eus:7.2:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_eus:7.3:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_eus:7.4:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_eus:7.5:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_eus:7.6:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_server_aus:5.9:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_server_aus:6.4:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_server_aus:6.5:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_server_aus:6.6:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_server_aus:7.2:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_server_aus:7.3:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_server_tus:7.2:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_server_tus:7.3:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_server_tus:7.4:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*

History

21 Nov 2024, 04:16

Type Values Removed Values Added
References () http://www.openwall.com/lists/oss-security/2019/04/23/4 - Mailing List, Third Party Advisory () http://www.openwall.com/lists/oss-security/2019/04/23/4 - Mailing List, Third Party Advisory
References () http://www.securityfocus.com/bid/108044 - Broken Link () http://www.securityfocus.com/bid/108044 - Broken Link
References () https://access.redhat.com/errata/RHSA-2019:0886 - Third Party Advisory () https://access.redhat.com/errata/RHSA-2019:0886 - Third Party Advisory
References () https://access.redhat.com/errata/RHSA-2019:1398 - Third Party Advisory () https://access.redhat.com/errata/RHSA-2019:1398 - Third Party Advisory
References () https://access.redhat.com/errata/RHSA-2019:1399 - Third Party Advisory () https://access.redhat.com/errata/RHSA-2019:1399 - Third Party Advisory
References () https://access.redhat.com/errata/RHSA-2019:1400 - Third Party Advisory () https://access.redhat.com/errata/RHSA-2019:1400 - Third Party Advisory
References () https://access.redhat.com/errata/RHSA-2019:2777 - Third Party Advisory () https://access.redhat.com/errata/RHSA-2019:2777 - Third Party Advisory
References () https://access.redhat.com/errata/RHSA-2019:2778 - Third Party Advisory () https://access.redhat.com/errata/RHSA-2019:2778 - Third Party Advisory
References () https://access.redhat.com/errata/RHSA-2019:2779 - Third Party Advisory () https://access.redhat.com/errata/RHSA-2019:2779 - Third Party Advisory
References () https://access.redhat.com/errata/RHSA-2019:2780 - Third Party Advisory () https://access.redhat.com/errata/RHSA-2019:2780 - Third Party Advisory
References () https://access.redhat.com/errata/RHSA-2019:2781 - Third Party Advisory () https://access.redhat.com/errata/RHSA-2019:2781 - Third Party Advisory
References () https://access.redhat.com/errata/RHSA-2019:2782 - Third Party Advisory () https://access.redhat.com/errata/RHSA-2019:2782 - Third Party Advisory
References () https://issues.apache.org/jira/browse/PROTON-2014?page=com.atlassian.jira.plugin.system.issuetabpanels%3Aall-tabpanel - Issue Tracking, Vendor Advisory () https://issues.apache.org/jira/browse/PROTON-2014?page=com.atlassian.jira.plugin.system.issuetabpanels%3Aall-tabpanel - Issue Tracking, Vendor Advisory
References () https://lists.apache.org/thread.html/008ee5e78e5a090e1fcc5f6617f425e4e51d59f03d3eda2dd006df9f%40%3Cusers.qpid.apache.org%3E - () https://lists.apache.org/thread.html/008ee5e78e5a090e1fcc5f6617f425e4e51d59f03d3eda2dd006df9f%40%3Cusers.qpid.apache.org%3E -
References () https://lists.apache.org/thread.html/3adb2f020f705b4fd453982992a68cd10f9d5ac728b699efdb73c1f5%40%3Cdev.qpid.apache.org%3E - () https://lists.apache.org/thread.html/3adb2f020f705b4fd453982992a68cd10f9d5ac728b699efdb73c1f5%40%3Cdev.qpid.apache.org%3E -
References () https://lists.apache.org/thread.html/49c83f0acce5ceaeffca51714ec2ba0f0199bcb8f99167181bba441b%40%3Cdev.qpid.apache.org%3E - () https://lists.apache.org/thread.html/49c83f0acce5ceaeffca51714ec2ba0f0199bcb8f99167181bba441b%40%3Cdev.qpid.apache.org%3E -
References () https://lists.apache.org/thread.html/914424e4d798a340f523b6169aaf39b626971d9bb00fcdeb1d5d6c0d%40%3Ccommits.qpid.apache.org%3E - () https://lists.apache.org/thread.html/914424e4d798a340f523b6169aaf39b626971d9bb00fcdeb1d5d6c0d%40%3Ccommits.qpid.apache.org%3E -
References () https://lists.apache.org/thread.html/d9c9a882a292e2defaed1f954528c916fb64497ce57db652727e39b0%40%3Cannounce.apache.org%3E - () https://lists.apache.org/thread.html/d9c9a882a292e2defaed1f954528c916fb64497ce57db652727e39b0%40%3Cannounce.apache.org%3E -

22 Apr 2022, 20:09

Type Values Removed Values Added
CVSS v2 : 4.0
v3 : 7.4
v2 : 5.8
v3 : 7.4
CWE CWE-295 NVD-CWE-noinfo
References (REDHAT) https://access.redhat.com/errata/RHSA-2019:1398 - (REDHAT) https://access.redhat.com/errata/RHSA-2019:1398 - Third Party Advisory
References (REDHAT) https://access.redhat.com/errata/RHSA-2019:2781 - (REDHAT) https://access.redhat.com/errata/RHSA-2019:2781 - Third Party Advisory
References (REDHAT) https://access.redhat.com/errata/RHSA-2019:1399 - (REDHAT) https://access.redhat.com/errata/RHSA-2019:1399 - Third Party Advisory
References (REDHAT) https://access.redhat.com/errata/RHSA-2019:2780 - (REDHAT) https://access.redhat.com/errata/RHSA-2019:2780 - Third Party Advisory
References (BID) http://www.securityfocus.com/bid/108044 - Third Party Advisory, VDB Entry (BID) http://www.securityfocus.com/bid/108044 - Broken Link
References (REDHAT) https://access.redhat.com/errata/RHSA-2019:2779 - (REDHAT) https://access.redhat.com/errata/RHSA-2019:2779 - Third Party Advisory
References (REDHAT) https://access.redhat.com/errata/RHSA-2019:2782 - (REDHAT) https://access.redhat.com/errata/RHSA-2019:2782 - Third Party Advisory
References (REDHAT) https://access.redhat.com/errata/RHSA-2019:2778 - (REDHAT) https://access.redhat.com/errata/RHSA-2019:2778 - Third Party Advisory
References (REDHAT) https://access.redhat.com/errata/RHSA-2019:1400 - (REDHAT) https://access.redhat.com/errata/RHSA-2019:1400 - Third Party Advisory
References (REDHAT) https://access.redhat.com/errata/RHSA-2019:2777 - (REDHAT) https://access.redhat.com/errata/RHSA-2019:2777 - Third Party Advisory
CPE cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_eus:7.2:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_eus:7.4:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*
cpe:2.3:a:redhat:openstack:14:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_eus:7.3:*:*:*:*:*:*:*
cpe:2.3:a:redhat:openstack:13:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_server_tus:7.2:*:*:*:*:*:*:*
cpe:2.3:a:redhat:satellite:6.3:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_server_aus:6.6:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_server_aus:5.9:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_server_tus:7.4:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_eus:6.7:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
cpe:2.3:a:redhat:satellite:6.5:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_eus:7.6:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_server_tus:7.3:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_eus:7.5:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_server_aus:7.2:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_server_aus:7.3:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_server_aus:6.5:*:*:*:*:*:*:*
cpe:2.3:a:redhat:satellite:6.4:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_server_aus:6.4:*:*:*:*:*:*:*

Information

Published : 2019-04-23 16:29

Updated : 2024-11-21 04:16


NVD link : CVE-2019-0223

Mitre link : CVE-2019-0223

CVE.ORG link : CVE-2019-0223


JSON object : View

Products Affected

redhat

  • enterprise_linux_desktop
  • satellite
  • jboss_amq_clients_2
  • enterprise_linux_server
  • enterprise_linux_workstation
  • enterprise_linux_server_aus
  • enterprise_linux_server_tus
  • linux
  • enterprise_linux_eus
  • openstack

apache

  • qpid