First published: Mon Aug 24 2015(Updated: )
Apache ActiveMQ could allow a remote authenticated attacker to bypass security restrictions, caused by an error in the LDAPLoginModule implementation. By sending an empty password, an attacker could exploit this vulnerability to bypass the authentication mechanism of an application using LDAPLoginModule and assume the role of another user.
Credit: secalert@redhat.com secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
IBM Security Directory Suite VA | <=8.0.1-8.0.1.19 | |
Apache ActiveMQ | =5.0.0 | |
Apache ActiveMQ | =5.1.0 | |
Apache ActiveMQ | =5.2.0 | |
Apache ActiveMQ | =5.3.0 | |
Apache ActiveMQ | =5.3.1 | |
Apache ActiveMQ | =5.3.2 | |
Apache ActiveMQ | =5.4.0 | |
Apache ActiveMQ | =5.4.1 | |
Apache ActiveMQ | =5.4.2 | |
Apache ActiveMQ | =5.4.3 | |
Apache ActiveMQ | =5.5.0 | |
Apache ActiveMQ | =5.5.1 | |
Apache ActiveMQ | =5.6.0 | |
Apache ActiveMQ | =5.7.0 | |
Apache ActiveMQ | =5.8.0 | |
Apache ActiveMQ | =5.9.0 | |
Apache ActiveMQ | =5.9.1 | |
Apache ActiveMQ | =5.10.0 | |
maven/org.apache.activemq:activemq-jaas | >=5.0.0<5.10.1 | 5.10.1 |
maven/org.apache.activemq:activemq-broker | >=5.0.0<5.10.1 | 5.10.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID is CVE-2014-3612.
The affected software is Apache ActiveMQ versions 5.0.0 to 5.10.1.
The vulnerability allows remote attackers to bypass authentication by logging in with an empty password and valid username, triggering an unauthenticated bind.
The severity of CVE-2014-3612 is high with a CVSS score of 7.5.
More information about CVE-2014-3612 can be found at the following references: [Reference 1](http://activemq.apache.org/security-advisories.data/CVE-2014-3612-announcement.txt), [Reference 2](http://rhn.redhat.com/errata/RHSA-2015-0137.html), [Reference 3](http://rhn.redhat.com/errata/RHSA-2015-0138.html).