CVE-2015-0224

CWE-197 documents5 sources
Severity
7.5HIGH
EPSS
56.0%
top 1.90%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedOct 30
Latest updateMay 14

Description

qpidd in Apache Qpid 0.30 and earlier allows remote attackers to cause a denial of service (daemon crash) via a crafted protocol sequence set. NOTE: this vulnerability exists because of an incomplete fix for CVE-2015-0203.

CVSS vector

CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:HExploitability: 3.9 | Impact: 3.6

Affected Packages1 packages

NVDapache/qpid0.30

Patches

🔴Vulnerability Details

2
GHSA
GHSA-qrxf-m4mx-cp67: qpidd in Apache Qpid 02022-05-14
CVEList
CVE-2015-0224: qpidd in Apache Qpid 02017-10-30

📋Vendor Advisories

1
Red Hat
qpid-cpp: AMQP 0-10 protocol sequence-set maximal range DoS (incomplete CVE-2015-0203 fix)2015-01-27

💬Community

3
Bugzilla
CVE-2015-0224 qpid-cpp: qpidd can be crashed by unauthenticated user (incomplete fix for CVE-2015-0203) [fedora-all]2015-01-27
Bugzilla
CVE-2015-0224 qpid-cpp: AMQP 0-10 protocol sequence-set maximal range DoS (incomplete CVE-2015-0203 fix)2015-01-27
Bugzilla
CVE-2015-0224 qpid-cpp: qpidd can be crashed by unauthenticated user (incomplete fix for CVE-2015-0203) [epel-7]2015-01-27
CVE-2015-0224 (HIGH CVSS 7.5) | qpidd in Apache Qpid 0.30 and earli | cvebase.io