First published: Mon Oct 04 2010(Updated: )
A flaw was discovered in how the MRG broker handled the receipt of large persistent messages. If a remote authenticated user were to send a very large persistent message, the broker could exhaust stack memory, resulting in a segfault of the broker. Subsequent connections to the broker would fail until it was restarted.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
redhat enterprise MRG | =1.1.2 | |
redhat enterprise MRG | <=1.2 | |
redhat enterprise MRG | =1.0.3 | |
redhat enterprise MRG | =1.1.1 | |
redhat enterprise MRG | =1.0 | |
redhat enterprise MRG | =1.0.2 | |
redhat enterprise MRG | =1.0.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2010-3701 is classified as a high severity vulnerability due to the potential for denial of service.
To fix CVE-2010-3701, upgrade to the latest version of Red Hat Enterprise MRG that addresses this issue.
CVE-2010-3701 affects various versions of Red Hat Enterprise MRG, including 1.0, 1.0.1, 1.0.2, 1.0.3, 1.1.1, and 1.1.2.
CVE-2010-3701 can be exploited by a remote authenticated user sending very large persistent messages to the broker.
The impact of CVE-2010-3701 includes stack memory exhaustion leading to a segmentation fault in the broker, causing service interruption.