NA

CVE-2023-46118

Published: 25/10/2023 Updated: 14/12/2023
CVSS v3 Base Score: 4.9 | Impact Score: 3.6 | Exploitability Score: 1.2
VMScore: 0

Vulnerability Summary

RabbitMQ is a multi-protocol messaging and streaming broker. HTTP API did not enforce an HTTP request body limit, making it vulnerable for denial of service (DoS) attacks with very large messages. An authenticated user with sufficient credentials can publish a very large messages over the HTTP API and cause target node to be terminated by an "out-of-memory killer"-like mechanism. This vulnerability has been patched in versions 3.11.24 and 3.12.7.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

vmware rabbitmq

Vendor Advisories

Debian Bug report logs - #1056723 rabbitmq-server: CVE-2023-46118 Package: src:rabbitmq-server; Maintainer for src:rabbitmq-server is Debian OpenStack <team+openstack@trackerdebianorg>; Reported by: Salvatore Bonaccorso <carnil@debianorg> Date: Sat, 25 Nov 2023 12:45:01 UTC Severity: important Tags: security, upst ...
It was discovered that missing input sanitising in the HTTP API endpoint of RabbitMQ, an implementation of the AMQP protocol, could result in denial of service For the oldstable distribution (bullseye), this problem has been fixed in version 389-3+deb11u1 For the stable distribution (bookworm), this problem has been fixed in version 3108-11+ ...