First published: Wed Jun 01 2016(Updated: )
PlainSaslServer.java in Apache Qpid Java before 6.0.3, when the broker is configured to allow plaintext passwords, allows remote attackers to cause a denial of service (broker termination) via a crafted authentication attempt, which triggers an uncaught exception.
Credit: secalert@redhat.com secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Apache Qpid Broker-J | <=6.0.2 | |
maven/org.apache.qpid:qpid-broker | <6.0.3 | 6.0.3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2016-3094 is classified as a high severity vulnerability due to its potential to cause denial of service by terminating the broker via crafted authentication attempts.
To fix CVE-2016-3094, upgrade your Apache Qpid Java Broker to version 6.0.3 or later.
CVE-2016-3094 is caused by a flaw in PlainSaslServer.java when the broker allows plaintext passwords, allowing attackers to trigger uncaught exceptions.
Yes, CVE-2016-3094 can be exploited remotely by attackers through crafted authentication attempts.
Yes, if you are running Apache Qpid Broker-J version 6.0.2 or earlier, you are vulnerable to CVE-2016-3094.