First published: Tue Feb 13 2018(Updated: )
A Denial of Service vulnerability was found in Apache Qpid Dispatch Router versions 0.7.0 and 0.8.0. To exploit this vulnerability, a remote user must be able to establish an AMQP connection to the Qpid Dispatch Router and send a specifically crafted AMQP frame which will cause it to segfault and shut down.
Credit: security@apache.org
Affected Software | Affected Version | How to fix |
---|---|---|
Apache Qpid Dispatch | =0.7.0 | |
Apache Qpid Dispatch | =0.8.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2017-15699 has a severity rating of medium due to its potential to cause Denial of Service.
To fix CVE-2017-15699, upgrade Apache Qpid Dispatch Router to at least version 0.8.1 or later to patch the vulnerability.
The affected versions of Apache Qpid Dispatch Router are 0.7.0 and 0.8.0.
The impact of CVE-2017-15699 is that it allows a remote attacker to exploit the vulnerability and cause the application to crash.
Yes, CVE-2017-15699 can be exploited remotely if the attacker can establish an AMQP connection to the affected Qpid Dispatch Router.