First published: Sun Dec 01 2019(Updated: )
An issue was discovered in amqp_handle_input in amqp_connection.c in rabbitmq-c 0.9.0. There is an integer overflow that leads to heap memory corruption in the handling of CONNECTION_STATE_HEADER. A rogue server could return a malicious frame header that leads to a smaller target_size value than needed. This condition is then carried on to a memcpy function that copies too much data into a heap buffer.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
debian/librabbitmq | 0.10.0-1 0.11.0-1 0.14.0-1 | |
rabbitmq-c | <0.10.0 | |
Fedoraproject Fedora | =30 | |
Fedoraproject Fedora | =31 | |
Ubuntu Linux | =14.04 | |
Ubuntu Linux | =16.04 | |
Ubuntu Linux | =18.04 | |
Ubuntu Linux | =19.04 | |
Ubuntu Linux | =19.10 | |
Debian Debian Linux | =8.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2019-18609 has a severity rating that indicates it can lead to heap memory corruption, which may allow for code execution or system compromise.
To fix CVE-2019-18609, upgrade to a version of rabbitmq-c newer than 0.10.0 or update the affected packages in your system.
Versions of rabbitmq-c prior to 0.10.0 are affected by CVE-2019-18609.
CVE-2019-18609 can lead to potential remote code execution or denial of service due to memory corruption.
Yes, CVE-2019-18609 can be exploited by a rogue server sending a malicious frame header to trigger the vulnerability.