org.apache.qpid:qpid-common@0.10 vulnerabilities

  • latest version

    6.1.7

  • latest non vulnerable version

  • first published

    13 years ago

  • latest version published

    6 years ago

  • licenses detected

  • package manager

  • Direct Vulnerabilities

    Known vulnerabilities in the org.apache.qpid:qpid-common package. This does not include vulnerabilities belonging to this package’s dependencies.

    How to fix?

    Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.

    Fix for free
    VulnerabilityVulnerable Version
    • M
    Resource Management Errors

    org.apache.qpid:qpid-common is a Common functionality qpid package from Apache.

    Affected versions of this package are vulnerable to Resource Management Errors. Does not properly restrict incoming client connections, which allows remote attackers to cause a denial of service (file descriptor consumption) via a large number of incomplete connections.

    How to fix Resource Management Errors?

    Upgrade org.apache.qpid:qpid-common to version 0.18 or higher.

    [,0.18)
    • M
    Improper Authentication

    org.apache.qpid:qpid-common is a Common functionality qpid package from Apache.

    Affected versions of this package are vulnerable to Improper Authentication. The default configuration for Apache Qpid 0.20 and earlier, when the federation_tag attribute is enabled, accepts AMQP connections without checking the source user ID, which allows remote attackers to bypass authentication and have other unspecified impact via an AMQP request.

    How to fix Improper Authentication?

    Upgrade org.apache.qpid:qpid-common to version 0.24 or higher.

    [,0.24)
    • M
    Denial of Service (DoS)

    org.apache.qpid:qpid-common is a Common functionality qpid package from Apache.

    Affected versions of this package are vulnerable to Denial of Service (DoS). The AMQP type decoder allows remote attackers to cause a denial of service (memory consumption and server crash) via a large number of zero width elements in the client-properties map in a connection.start-ok message.

    How to fix Denial of Service (DoS)?

    Upgrade org.apache.qpid:qpid-common to version 0.20 or higher.

    [,0.20)