6.1.7
12 years ago
3 months ago
Known vulnerabilities in the org.apache.activemq:activemq-client package. This does not include vulnerabilities belonging to this package’s dependencies.
Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.
Fix for freeVulnerability | Vulnerable Version |
---|---|
org.apache.activemq:activemq-client is a high performance Apache 2.0 licensed Message Broker and JMS 1.1 implementation. Affected versions of this package are vulnerable to Memory Allocation with Excessive Size Value during the unmarshalling of OpenWire commands, where the size value of buffers is not properly validated. An attacker can deplete process memory and cause service disruptions by sending crafted messages. How to fix Memory Allocation with Excessive Size Value? Upgrade | [,5.16.8)[5.17.0,5.17.7)[5.18.0,5.18.7)[6.0.0,6.1.6) |
org.apache.activemq:activemq-client is a high performance Apache 2.0 licensed Message Broker and JMS 1.1 implementation. Affected versions of this package are vulnerable to Deserialization of Untrusted Data via the How to fix Deserialization of Untrusted Data? Upgrade | [,5.15.16)[5.16.0,5.16.7)[5.17.0,5.17.6)[5.18.0,5.18.3) |
org.apache.activemq:activemq-client is a high performance Apache 2.0 licensed Message Broker and JMS 1.1 implementation. Affected versions of this package are vulnerable to Denial of Service (DoS) in the How to fix Denial of Service (DoS)? Upgrade | [5.0.0,5.14.5) |
org.apache.activemq:activemq-client is a high performance Apache 2.0 licensed Message Broker and JMS 1.1 implementation. Affected versions of this package are vulnerable to Man-in-the-Middle (MitM) due to missing TLS hostname verification. How to fix Man-in-the-Middle (MitM)? Upgrade | [5.0.0,5.15.6) |
org.apache.activemq:activemq-client is a high performance Apache 2.0 licensed Message Broker and JMS 1.1 implementation. Affected versions of this package are vulnerable to Arbitrary Code Execution. Apache ActiveMQ doesn't restrict the classes that can be serialized in the broker, which allows remote attackers to execute arbitrary code via a crafted serialized Java Message Service (JMS) ObjectMessage object. How to fix Arbitrary Code Execution? Upgrade | [,5.11.3)[5.12.0,5.12.2) |
org.apache.activemq:activemq-client is a high performance Apache 2.0 licensed Message Broker and JMS 1.1 implementation. Affected versions of this package are vulnerable to XML External Entity (XXE) Injection. This could allow remote consumers to have unspecified impact via vectors involving an XPath based selector when dequeuing XML messages. How to fix XML External Entity (XXE) Injection? Upgrade | [5,5.10.1) |