First published: Mon Sep 10 2018(Updated: )
Apache ActiveMQ Client could allow a remote attacker to conduct a man-in-the-middle attack, caused by a missing TLS hostname verification. An attacker could exploit this vulnerability to launch a man-in-the-middle attack between a Java application using the ActiveMQ client and the ActiveMQ server.
Credit: security@apache.org security@apache.org
Affected Software | Affected Version | How to fix |
---|---|---|
Apache ActiveMQ | <5.15.6 | |
Oracle Enterprise Repository | =12.1.3.0.0 | |
Oracle FLEXCUBE Private Banking | =2.0.0.0 | |
Oracle FLEXCUBE Private Banking | =2.2.0.1 | |
Oracle FLEXCUBE Private Banking | =12.0.1.0 | |
Oracle FLEXCUBE Private Banking | =12.0.3.0 | |
Oracle FLEXCUBE Private Banking | =12.1.0.0 | |
maven/org.apache.activemq:activemq-client | <5.15.6 | 5.15.6 |
redhat/ActiveMQ | <5.15.6 | 5.15.6 |
debian/activemq | 5.16.1-1 5.17.2+dfsg-2 5.17.6+dfsg-1 | |
IBM Security Directory Suite VA | <=8.0.1-8.0.1.19 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this vulnerability is CVE-2018-11775.
CVE-2018-11775 has a severity level of 7.4 (High).
The affected software for CVE-2018-11775 includes Apache ActiveMQ Client before version 5.15.6, Oracle Enterprise Repository version 12.1.3.0.0, Oracle FLEXCUBE Private Banking versions 2.0.0.0, 2.2.0.1, 12.0.1.0, 12.0.3.0, 12.1.0.0, and IBM Security Directory Suite VA up to version 8.0.1-8.0.1.19.
The vulnerability CVE-2018-11775 allows a remote attacker to conduct a man-in-the-middle attack between a Java application using the ActiveMQ client and the ActiveMQ server.
To fix the vulnerability CVE-2018-11775, update the Apache ActiveMQ Client to version 5.15.6 or later.