6.8
CVSSv2

CVE-2012-4446

Published: 14/03/2013 Updated: 19/03/2013
CVSS v2 Base Score: 6.8 | Impact Score: 6.4 | Exploitability Score: 8.6
VMScore: 605
Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P

Vulnerability Summary

The default configuration for Apache Qpid 0.20 and previous versions, when the federation_tag attribute is enabled, accepts AMQP connections without checking the source user ID, which allows remote malicious users to bypass authentication and have other unspecified impact via an AMQP request.

Vulnerable Product Search on Vulmon Subscribe to Product

apache qpid 0.7

apache qpid 0.6

apache qpid 0.5

apache qpid 0.16

apache qpid 0.15

apache qpid 0.14

apache qpid 0.13

apache qpid 0.19

apache qpid 0.17

apache qpid 0.12

apache qpid 0.10

apache qpid 0.8

apache qpid

apache qpid 0.18

apache qpid 0.11

apache qpid 0.9

Vendor Advisories

Synopsis Moderate: Red Hat Enterprise MRG Messaging 23 security update Type/Severity Security Advisory: Moderate Topic Updated Messaging component packages that fix multiple security issues,several bugs, and add various enhancements are now available for Red HatEnterprise MRG 23 for Red Hat Enterprise Lin ...
Synopsis Moderate: Red Hat Enterprise MRG Messaging 23 security update Type/Severity Security Advisory: Moderate Topic Updated Messaging component packages that fix multiple security issues,several bugs, and add various enhancements are now available for Red HatEnterprise MRG 23 for Red Hat Enterprise Lin ...