HIGH · 7.4

CVE-2019-0223

While investigating bug PROTON-2014, we discovered that under some circumstances Apache Qpid Proton versions 0.9 to 0.27.0 (C library and its language bindings) can connect to a peer anonymously using...

Vulnerability Description

While investigating bug PROTON-2014, we discovered that under some circumstances Apache Qpid Proton versions 0.9 to 0.27.0 (C library and its language bindings) can connect to a peer anonymously using TLS *even when configured to verify the peer certificate* while used with OpenSSL versions before 1.1.0. This means that an undetected man in the middle attack could be constructed if an attacker can arrange to intercept TLS traffic.

CVSS Score

7.4

HIGH

CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N
Attack Vector
NETWORK
Attack Complexity
HIGH
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality
HIGH
Integrity
HIGH
Availability
NONE

Affected Products

VendorProductVersions
ApacheQpid>= 0.9, <= 0.27.0
RedhatJboss Amq Clients 2-
RedhatLinux6.0
RedhatOpenstack13
RedhatSatellite6.3
RedhatEnterprise Linux Desktop6.0
RedhatEnterprise Linux Eus6.7
RedhatEnterprise Linux Server6.0
RedhatEnterprise Linux Server Aus5.9
RedhatEnterprise Linux Server Tus7.2
RedhatEnterprise Linux Workstation6.0

References

FAQ

What is CVE-2019-0223?

CVE-2019-0223 is a vulnerability with a CVSS score of 7.4 (HIGH). While investigating bug PROTON-2014, we discovered that under some circumstances Apache Qpid Proton versions 0.9 to 0.27.0 (C library and its language bindings) can connect to a peer anonymously using...

How severe is CVE-2019-0223?

CVE-2019-0223 has been rated HIGH with a CVSS base score of 7.4/10. Review the CVSS metrics above for detailed severity breakdown.

Is there a patch for CVE-2019-0223?

Check the references section above for vendor advisories and patch information. Affected products include: Apache Qpid, Redhat Jboss Amq Clients 2, Redhat Linux, Redhat Openstack, Redhat Satellite.