Vulnerability Description
sys/ssl/SslSocket.cpp in qpidd in Apache Qpid, as used in Red Hat Enterprise MRG before 1.2.2 and other products, when SSL is enabled, allows remote attackers to cause a denial of service (daemon outage) by connecting to the SSL port but not participating in an SSL handshake.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Apache | Qpid | 0.5 |
| Redhat | Enterprise Mrg | <= 1.2 |
References
- http://secunia.com/advisories/41710
- http://svn.apache.org/viewvc/qpid/trunk/qpid/cpp/src/qpid/sys/ssl/SslSocket.cpp?Patch
- http://www.openwall.com/lists/oss-security/2010/10/08/1
- http://www.redhat.com/support/errata/RHSA-2010-0756.htmlPatchVendor Advisory
- http://www.redhat.com/support/errata/RHSA-2010-0757.htmlPatchVendor Advisory
- https://bugzilla.redhat.com/show_bug.cgi?id=632657
- http://secunia.com/advisories/41710
- http://svn.apache.org/viewvc/qpid/trunk/qpid/cpp/src/qpid/sys/ssl/SslSocket.cpp?Patch
- http://www.openwall.com/lists/oss-security/2010/10/08/1
- http://www.redhat.com/support/errata/RHSA-2010-0756.htmlPatchVendor Advisory
- http://www.redhat.com/support/errata/RHSA-2010-0757.htmlPatchVendor Advisory
- https://bugzilla.redhat.com/show_bug.cgi?id=632657
FAQ
What is CVE-2010-3083?
CVE-2010-3083 is a vulnerability with a CVSS score of 4.3 (MEDIUM). sys/ssl/SslSocket.cpp in qpidd in Apache Qpid, as used in Red Hat Enterprise MRG before 1.2.2 and other products, when SSL is enabled, allows remote attackers to cause a denial of service (daemon outa...
How severe is CVE-2010-3083?
CVE-2010-3083 has been rated MEDIUM with a CVSS base score of 4.3/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2010-3083?
Check the references section above for vendor advisories and patch information. Affected products include: Apache Qpid, Redhat Enterprise Mrg.