Description
An issue was discovered in amqp_handle_input in amqp_connection.c in rabbitmq-c 0.9.0. There is an integer overflow that leads to heap memory corruption in the handling of CONNECTION_STATE_HEADER. A rogue server could return a malicious frame header that leads to a smaller target_size value than needed. This condition is then carried on to a memcpy function that copies too much data into a heap buffer.
Analysis and contextual insights are available on OpenCVE Cloud.
Remediation
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
Debian DLA |
DLA-2022-1 | librabbitmq security update |
EUVD |
EUVD-2019-8339 | An issue was discovered in amqp_handle_input in amqp_connection.c in rabbitmq-c 0.9.0. There is an integer overflow that leads to heap memory corruption in the handling of CONNECTION_STATE_HEADER. A rogue server could return a malicious frame header that leads to a smaller target_size value than needed. This condition is then carried on to a memcpy function that copies too much data into a heap buffer. |
Ubuntu USN |
USN-4214-1 | RabbitMQ vulnerability |
Ubuntu USN |
USN-4214-2 | RabbitMQ vulnerability |
References
History
No history.
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-08-05T01:54:14.437Z
Reserved: 2019-10-29T00:00:00.000Z
Link: CVE-2019-18609
No data.
Status : Modified
Published: 2019-12-01T22:15:10.897
Modified: 2024-11-21T04:33:21.440
Link: CVE-2019-18609
OpenCVE Enrichment
No data.
Debian DLA
EUVD
Ubuntu USN