First published: Tue Apr 23 2019(Updated: )
While investigating bug PROTON-2014, we discovered that under some circumstances Apache Qpid Proton versions 0.9 to 0.27.0 (C library and its language bindings) can connect to a peer anonymously using TLS *even when configured to verify the peer certificate* while used with OpenSSL versions before 1.1.0. This means that an undetected man in the middle attack could be constructed if an attacker can arrange to intercept TLS traffic.
Credit: security@apache.org
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/qpid-proton | <0.27.1 | 0.27.1 |
Apache Qpid | >=0.9<=0.27.0 | |
Red Hat JBoss AMQ Clients | ||
Red Hat Linux | =6.0 | |
Red Hat Linux | =7.0 | |
redhat openstack | =13 | |
redhat openstack | =14 | |
redhat satellite | =6.3 | |
redhat satellite | =6.4 | |
redhat satellite | =6.5 | |
redhat enterprise Linux desktop | =6.0 | |
redhat enterprise Linux desktop | =7.0 | |
redhat enterprise Linux eus | =6.7 | |
redhat enterprise Linux eus | =7.2 | |
redhat enterprise Linux eus | =7.3 | |
redhat enterprise Linux eus | =7.4 | |
redhat enterprise Linux eus | =7.5 | |
redhat enterprise Linux eus | =7.6 | |
redhat enterprise Linux server | =6.0 | |
redhat enterprise Linux server | =7.0 | |
redhat enterprise Linux server aus | =5.9 | |
redhat enterprise Linux server aus | =6.4 | |
redhat enterprise Linux server aus | =6.5 | |
redhat enterprise Linux server aus | =6.6 | |
redhat enterprise Linux server aus | =7.2 | |
redhat enterprise Linux server aus | =7.3 | |
redhat enterprise Linux server aus | =7.4 | |
redhat enterprise Linux server aus | =7.6 | |
redhat enterprise Linux server tus | =7.2 | |
redhat enterprise Linux server tus | =7.3 | |
redhat enterprise Linux server tus | =7.4 | |
redhat enterprise Linux server tus | =7.6 | |
redhat enterprise Linux workstation | =6.0 | |
redhat enterprise Linux workstation | =7.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2019-0223 has been classified as a medium severity vulnerability.
To fix CVE-2019-0223, upgrade to Apache Qpid Proton version 0.27.1 or later.
CVE-2019-0223 affects Apache Qpid Proton versions from 0.9 to 0.27.0.
Yes, CVE-2019-0223 occurs when using Apache Qpid Proton with OpenSSL versions prior to 1.
CVE-2019-0223 is a TLS-related vulnerability that allows anonymous connections despite peer certificate verification being configured.