First published: Thu Sep 27 2012(Updated: )
Integer overflow in the qpid::framing::Buffer::checkAvailable function in Apache Qpid 0.20 and earlier allows remote attackers to cause a denial of service (crash) via a crafted message, which triggers an out-of-bounds read.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Apache Qpid | <=0.20 | |
Apache Qpid | =0.5 | |
Apache Qpid | =0.6 | |
Apache Qpid | =0.7 | |
Apache Qpid | =0.8 | |
Apache Qpid | =0.9 | |
Apache Qpid | =0.10 | |
Apache Qpid | =0.11 | |
Apache Qpid | =0.12 | |
Apache Qpid | =0.13 | |
Apache Qpid | =0.14 | |
Apache Qpid | =0.15 | |
Apache Qpid | =0.16 | |
Apache Qpid | =0.17 | |
Apache Qpid | =0.18 | |
Apache Qpid | =0.19 | |
redhat/qpid-cpp | <0.21 | 0.21 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2012-4459 is classified as a high severity vulnerability due to its potential for denial of service attacks.
To fix CVE-2012-4459, upgrade Apache Qpid to version 0.21 or later.
CVE-2012-4459 affects Apache Qpid versions 0.20 and earlier, as well as versions 0.5 through 0.19.
CVE-2012-4459 allows attackers to perform a denial of service by crashing the application through a crafted message.
There are no public exploits specifically for CVE-2012-4459, but the vulnerability can be exploited by sending specially crafted messages to the affected service.