Vulnerability Description
While investigating bug PROTON-2014, we discovered that under some circumstances Apache Qpid Proton versions 0.9 to 0.27.0 (C library and its language bindings) can connect to a peer anonymously using TLS *even when configured to verify the peer certificate* while used with OpenSSL versions before 1.1.0. This means that an undetected man in the middle attack could be constructed if an attacker can arrange to intercept TLS traffic.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Apache | Qpid | >= 0.9, <= 0.27.0 |
| Redhat | Jboss Amq Clients 2 | - |
| Redhat | Linux | 6.0 |
| Redhat | Openstack | 13 |
| Redhat | Satellite | 6.3 |
| Redhat | Enterprise Linux Desktop | 6.0 |
| Redhat | Enterprise Linux Eus | 6.7 |
| Redhat | Enterprise Linux Server | 6.0 |
| Redhat | Enterprise Linux Server Aus | 5.9 |
| Redhat | Enterprise Linux Server Tus | 7.2 |
| Redhat | Enterprise Linux Workstation | 6.0 |
References
- http://www.openwall.com/lists/oss-security/2019/04/23/4Mailing ListThird Party Advisory
- http://www.securityfocus.com/bid/108044Broken Link
- https://access.redhat.com/errata/RHSA-2019:0886Third Party Advisory
- https://access.redhat.com/errata/RHSA-2019:1398Third Party Advisory
- https://access.redhat.com/errata/RHSA-2019:1399Third Party Advisory
- https://access.redhat.com/errata/RHSA-2019:1400Third Party Advisory
- https://access.redhat.com/errata/RHSA-2019:2777Third Party Advisory
- https://access.redhat.com/errata/RHSA-2019:2778Third Party Advisory
- https://access.redhat.com/errata/RHSA-2019:2779Third Party Advisory
- https://access.redhat.com/errata/RHSA-2019:2780Third Party Advisory
- https://access.redhat.com/errata/RHSA-2019:2781Third Party Advisory
- https://access.redhat.com/errata/RHSA-2019:2782Third Party Advisory
- https://issues.apache.org/jira/browse/PROTON-2014?page=com.atlassian.jira.pluginIssue TrackingVendor Advisory
- https://lists.apache.org/thread.html/008ee5e78e5a090e1fcc5f6617f425e4e51d59f03d3
- https://lists.apache.org/thread.html/3adb2f020f705b4fd453982992a68cd10f9d5ac728b
FAQ
What is CVE-2019-0223?
CVE-2019-0223 is a vulnerability with a CVSS score of 7.4 (HIGH). While investigating bug PROTON-2014, we discovered that under some circumstances Apache Qpid Proton versions 0.9 to 0.27.0 (C library and its language bindings) can connect to a peer anonymously using...
How severe is CVE-2019-0223?
CVE-2019-0223 has been rated HIGH with a CVSS base score of 7.4/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2019-0223?
Check the references section above for vendor advisories and patch information. Affected products include: Apache Qpid, Redhat Jboss Amq Clients 2, Redhat Linux, Redhat Openstack, Redhat Satellite.