org.apache.qpid:qpid-common@0.12 vulnerabilities

Direct Vulnerabilities

Known vulnerabilities in the org.apache.qpid:qpid-common package. This does not include vulnerabilities belonging to this package’s dependencies.

Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.
Fix for free
Vulnerability Vulnerable Version
  • M
Resource Management Errors

org.apache.qpid:qpid-common is a Common functionality qpid package from Apache.

Affected versions of this package are vulnerable to Resource Management Errors. Does not properly restrict incoming client connections, which allows remote attackers to cause a denial of service (file descriptor consumption) via a large number of incomplete connections.

How to fix Resource Management Errors?

Upgrade org.apache.qpid:qpid-common to version 0.18 or higher.

[,0.18)
  • M
Improper Authentication

org.apache.qpid:qpid-common is a Common functionality qpid package from Apache.

Affected versions of this package are vulnerable to Improper Authentication. The default configuration for Apache Qpid 0.20 and earlier, when the federation_tag attribute is enabled, accepts AMQP connections without checking the source user ID, which allows remote attackers to bypass authentication and have other unspecified impact via an AMQP request.

How to fix Improper Authentication?

Upgrade org.apache.qpid:qpid-common to version 0.24 or higher.

[,0.24)
  • M
Denial of Service (DoS)

org.apache.qpid:qpid-common is a Common functionality qpid package from Apache.

Affected versions of this package are vulnerable to Denial of Service (DoS). The AMQP type decoder allows remote attackers to cause a denial of service (memory consumption and server crash) via a large number of zero width elements in the client-properties map in a connection.start-ok message.

How to fix Denial of Service (DoS)?

Upgrade org.apache.qpid:qpid-common to version 0.20 or higher.

[,0.20)