GLSA Advocate
Joined: 12 May 2004 Posts: 2663
|
Posted: Fri Mar 13, 2020 4:26 am Post subject: [ GLSA 202003-07 ] RabbitMQ C client |
|
|
Gentoo Linux Security Advisory
Title: RabbitMQ C client: Arbitrary code execution (GLSA 202003-07)
Severity: high
Exploitable: remote
Date: 2020-03-13
Bug(s): #701810
ID: 202003-07
Synopsis
A vulnerability in RabbitMQ C client might allow an attacker to
execute arbitrary code.
Background
A C-language AMQP client library for use with v2.0+ of the RabbitMQ
broker.
Affected Packages
Package: net-libs/rabbitmq-c
Vulnerable: < 0.10.0
Unaffected: >= 0.10.0
Architectures: All supported architectures
Description
It was discovered that RabbitMQ C client incorrectly handled certain
inputs.
Impact
A remote attacker, by sending a specially crafted request, could
possibly execute arbitrary code with the privileges of the process or
cause a Denial of Service condition.
Workaround
There is no known workaround at this time.
Resolution
All RabbitMQ C client users should upgrade to the latest version: Code: | # emerge --sync
# emerge --ask --oneshot --verbose ">=net-libs/rabbitmq-c-0.10.0"
|
References
CVE-2019-18609 |
|