First published: Tue Apr 12 2016(Updated: )
The (1) proton.reactor.Connector, (2) proton.reactor.Container, and (3) proton.utils.BlockingConnection classes in Apache Qpid Proton before 0.12.1 improperly use an unencrypted connection for an amqps URI scheme when SSL support is unavailable, which might allow man-in-the-middle attackers to obtain sensitive information or modify data via unspecified vectors.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Red Hat Python-qpid-proton | <=0.12.0 | |
Fedora | =23 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2016-2166 has been classified as a medium severity vulnerability due to its potential for man-in-the-middle attacks.
To fix CVE-2016-2166, upgrade Apache Qpid Proton to version 0.12.1 or later.
CVE-2016-2166 affects Apache Qpid Proton versions prior to 0.12.1 and Fedora version 23.
CVE-2016-2166 allows man-in-the-middle attackers to intercept and potentially alter unencrypted connections.
The vulnerable components in CVE-2016-2166 are the proton.reactor.Connector, proton.reactor.Container, and proton.utils.BlockingConnection classes.