Description
PlainSaslServer.java in Apache Qpid Java before 6.0.3, when the broker is configured to allow plaintext passwords, allows remote attackers to cause a denial of service (broker termination) via a crafted authentication attempt, which triggers an uncaught exception.
Remediation
References
http://mail-archives.apache.org/mod_mbox/qpid-users/201605.mbox/%3C5748641A.2050701%40gmail.com%3E
http://packetstormsecurity.com/files/137215/Apache-Qpid-Java-Broker-6.0.2-Denial-Of-Service.html
http://qpid.apache.org/releases/qpid-java-6.0.3/release-notes.html
http://www.securityfocus.com/archive/1/538507/100/0/threaded
http://www.securitytracker.com/id/1035982
https://issues.apache.org/jira/browse/QPID-7271
https://svn.apache.org/viewvc?view=revision&revision=1744403
Related Vulnerabilities
CVE-2022-36313 Vulnerability in npm package file-type
CVE-2020-2140 Vulnerability in maven package org.jenkins-ci.plugins:audit-trail
CVE-2023-26109 Vulnerability in npm package node-bluetooth-serial-port
CVE-2017-7678 Vulnerability in maven package org.apache.spark:spark-core_2.10
CVE-2019-10344 Vulnerability in maven package io.jenkins:configuration-as-code