CVE-2015-0224
Severity
7.5HIGH
EPSS
56.0%
top 1.90%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedOct 30
Latest updateMay 14
Description
qpidd in Apache Qpid 0.30 and earlier allows remote attackers to cause a denial of service (daemon crash) via a crafted protocol sequence set. NOTE: this vulnerability exists because of an incomplete fix for CVE-2015-0203.
CVSS vector
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:HExploitability: 3.9 | Impact: 3.6
Affected Packages1 packages
Patches
🔴Vulnerability Details
2📋Vendor Advisories
1Red Hat▶
qpid-cpp: AMQP 0-10 protocol sequence-set maximal range DoS (incomplete CVE-2015-0203 fix)↗2015-01-27
💬Community
3Bugzilla▶
CVE-2015-0224 qpid-cpp: qpidd can be crashed by unauthenticated user (incomplete fix for CVE-2015-0203) [fedora-all]↗2015-01-27
Bugzilla▶
CVE-2015-0224 qpid-cpp: AMQP 0-10 protocol sequence-set maximal range DoS (incomplete CVE-2015-0203 fix)↗2015-01-27
Bugzilla▶
CVE-2015-0224 qpid-cpp: qpidd can be crashed by unauthenticated user (incomplete fix for CVE-2015-0203) [epel-7]↗2015-01-27