← Voltar para CVEs
CVE-2012-3467
N/ADescricao
Apache QPID 0.14, 0.16, and earlier uses a NullAuthenticator mechanism to authenticate catch-up shadow connections to AMQP brokers, which allows remote attackers to bypass authentication.
Detalhes CVE
Pontuacao CVSS v3.1N/A
Publicado8/27/2012
Ultima modificacao4/11/2025
Fontenvd
Avistamentos honeypot0
Produtos afetados
apache:qpid
Fraquezas (CWE)
CWE-287
Referencias
http://rhn.redhat.com/errata/RHSA-2012-1277.html(secalert@redhat.com)
http://rhn.redhat.com/errata/RHSA-2012-1279.html(secalert@redhat.com)
http://secunia.com/advisories/50186(secalert@redhat.com)
http://secunia.com/advisories/50698(secalert@redhat.com)
http://svn.apache.org/viewvc?view=revision&revision=1352992(secalert@redhat.com)
http://www.openwall.com/lists/oss-security/2012/08/09/6(secalert@redhat.com)
http://www.securityfocus.com/bid/54954(secalert@redhat.com)
https://bugzilla.redhat.com/show_bug.cgi?id=836276(secalert@redhat.com)
https://exchange.xforce.ibmcloud.com/vulnerabilities/77568(secalert@redhat.com)
https://issues.apache.org/jira/browse/QPID-3849(secalert@redhat.com)
http://rhn.redhat.com/errata/RHSA-2012-1277.html(af854a3a-2127-422b-91ae-364da2661108)
http://rhn.redhat.com/errata/RHSA-2012-1279.html(af854a3a-2127-422b-91ae-364da2661108)
http://secunia.com/advisories/50186(af854a3a-2127-422b-91ae-364da2661108)
http://secunia.com/advisories/50698(af854a3a-2127-422b-91ae-364da2661108)
http://svn.apache.org/viewvc?view=revision&revision=1352992(af854a3a-2127-422b-91ae-364da2661108)
http://www.openwall.com/lists/oss-security/2012/08/09/6(af854a3a-2127-422b-91ae-364da2661108)
http://www.securityfocus.com/bid/54954(af854a3a-2127-422b-91ae-364da2661108)
https://bugzilla.redhat.com/show_bug.cgi?id=836276(af854a3a-2127-422b-91ae-364da2661108)
https://exchange.xforce.ibmcloud.com/vulnerabilities/77568(af854a3a-2127-422b-91ae-364da2661108)
https://issues.apache.org/jira/browse/QPID-3849(af854a3a-2127-422b-91ae-364da2661108)
Correlacoes IOC
Sem correlacoes registradas
This product uses data from the NVD API but is not endorsed or certified by the NVD.