Pivotal RabbitMQ, versions 3.7.x prior to 3.7.21 and 3.8.x prior to 3.8.1, and RabbitMQ for Pivotal Platform, 1.16.x versions prior to 1.16.7 and 1.17.x versions prior to 1.17.4, contain a web management plugin that is vulnerable to a denial of service attack. The "X-Reason" HTTP Header can be leveraged to insert a malicious Erlang format string that will expand and consume the heap, resulting in the server crashing.
References
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
Configuration 3 (hide)
|
Configuration 4 (hide)
|
History
15 May 2022, 14:14
Type | Values Removed | Values Added |
---|---|---|
References | (MLIST) https://lists.debian.org/debian-lts-announce/2021/07/msg00011.html - Third Party Advisory | |
CPE | cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:* |
17 Mar 2022, 14:06
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:a:vmware:rabbitmq:*:*:*:*:*:*:*:* |
04 Aug 2021, 17:15
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:a:redhat:openstack:15:*:*:*:*:*:*:* | |
References |
|
Information
Published : 2019-11-23 00:15
Updated : 2024-02-04 20:39
NVD link : CVE-2019-11287
Mitre link : CVE-2019-11287
CVE.ORG link : CVE-2019-11287
JSON object : View
Products Affected
debian
- debian_linux
pivotal_software
- rabbitmq
vmware
- rabbitmq
redhat
- openstack
fedoraproject
- fedora