Description
PlainSaslServer.java in Apache Qpid Java before 6.0.3, when the broker is configured to allow plaintext passwords, allows remote attackers to cause a denial of service (broker termination) via a crafted authentication attempt, which triggers an uncaught exception.
Remediation
References
https://issues.apache.org/jira/browse/QPID-7271
http://qpid.apache.org/releases/qpid-java-6.0.3/release-notes.html
https://svn.apache.org/viewvc?view=revision&revision=1744403
http://mail-archives.apache.org/mod_mbox/qpid-users/201605.mbox/%3C5748641A.2050701%40gmail.com%3E
http://packetstormsecurity.com/files/137215/Apache-Qpid-Java-Broker-6.0.2-Denial-Of-Service.html
http://www.securitytracker.com/id/1035982
http://www.securityfocus.com/archive/1/538507/100/0/threaded
Related Vulnerabilities
CVE-2023-22461 Vulnerability in npm package @mattkrick/sanitize-svg
CVE-2018-11087 Vulnerability in maven package com.rabbitmq:amqp-client
CVE-2014-0113 Vulnerability in maven package org.apache.struts:struts2-core
CVE-2021-32828 Vulnerability in maven package org.nuxeo.ecm.platform:nuxeo-platform-oauth