Description
PlainSaslServer.java in Apache Qpid Java before 6.0.3, when the broker is configured to allow plaintext passwords, allows remote attackers to cause a denial of service (broker termination) via a crafted authentication attempt, which triggers an uncaught exception.
Remediation
References
http://mail-archives.apache.org/mod_mbox/qpid-users/201605.mbox/%3C5748641A.2050701%40gmail.com%3E
http://packetstormsecurity.com/files/137215/Apache-Qpid-Java-Broker-6.0.2-Denial-Of-Service.html
http://qpid.apache.org/releases/qpid-java-6.0.3/release-notes.html
http://www.securityfocus.com/archive/1/538507/100/0/threaded
http://www.securitytracker.com/id/1035982
https://issues.apache.org/jira/browse/QPID-7271
https://svn.apache.org/viewvc?view=revision&revision=1744403
Related Vulnerabilities
CVE-2011-2487 Vulnerability in maven package org.apache.ws.security:wss4j
CVE-2021-21697 Vulnerability in maven package org.jenkins-ci.main:jenkins-core
CVE-2022-28150 Vulnerability in maven package com.synopsys.jenkinsci:ownership
CVE-2021-33036 Vulnerability in maven package org.apache.hadoop:hadoop-yarn-server-common
CVE-2023-46589 Vulnerability in maven package org.apache.tomcat:tomcat-catalina