First published: Thu Aug 01 2019(Updated: )
Apache ActiveMQ client is vulnerable to a denial of service, caused by a remote shutdown command in the ActiveMQConnection class. By sending a specific command, a remote authenticated attacker could exploit this vulnerability to cause the application to stop responding.
Credit: secalert@redhat.com secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
maven/org.apache.activemq:activemq-client | <5.14.5 | 5.14.5 |
debian/activemq | 5.16.1-1 5.17.2+dfsg-2 5.17.6+dfsg-1 | |
IBM Security Directory Suite VA | <=8.0.1-8.0.1.19 | |
Apache ActiveMQ | <5.14.5 | |
Apache ActiveMQ | >=5.15.0<5.15.5 | |
redhat jboss a-mq | =6.2.1 | |
redhat jboss a-mq | =6.3 | |
Red Hat JBoss Fuse | =6.3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2015-7559 is a vulnerability in the Apache ActiveMQ client that can be exploited by a remote authenticated attacker to cause a denial of service.
The severity of CVE-2015-7559 is medium, with a severity value of 6.5.
CVE-2015-7559 affects Apache ActiveMQ versions up to and including 5.14.5, and versions between 5.15.0 and 5.15.5. It allows a remote authenticated attacker to execute a remote shutdown command, causing the application to stop responding.
Yes, Redhat Jboss A-mq version 6.2.1 and Redhat Jboss Fuse version 6.3 are affected by CVE-2015-7559.
IBM Security Directory Suite VA version up to and including 8.0.1.19 is affected by CVE-2015-7559.