Credentials management in Fedoraproject Fedora



Published: 2015-08-24 | Updated: 2020-08-09
Risk Medium
Patch available YES
Number of vulnerabilities 1
CVE-ID CVE-2015-6524
CWE-ID CWE-255
Exploitation vector Network
Public exploit N/A
Vulnerable software
Subscribe
Fedora
Operating systems & Components / Operating system

ActiveMQ
Server applications / Mail servers

Vendor Fedoraproject
Apache Foundation

Security Bulletin

This security bulletin contains one medium risk vulnerability.

1) Credentials management

EUVDB-ID: #VU40671

Risk: Medium

CVSSv3.1: 4.6 [CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N/E:U/RL:O/RC:C]

CVE-ID: CVE-2015-6524

CWE-ID: CWE-255 - Credentials Management

Exploit availability: No

Description

The vulnerability allows a remote non-authenticated attacker to gain access to sensitive information.

The LDAPLoginModule implementation in the Java Authentication and Authorization Service (JAAS) in Apache ActiveMQ 5.x before 5.10.1 allows wildcard operators in usernames, which allows remote attackers to obtain credentials via a brute force attack. NOTE: this identifier was SPLIT from CVE-2014-3612 per ADT2 due to different vulnerability types.

Mitigation

Install update from vendor's website.

Vulnerable software versions

Fedora: 22 - 23

ActiveMQ: 5.0.0 - 23

External links

http://activemq.apache.org/security-advisories.data/CVE-2014-3612-announcement.txt
http://lists.fedoraproject.org/pipermail/package-announce/2015-October/168094.html
http://lists.fedoraproject.org/pipermail/package-announce/2015-October/168651.html


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.



###SIDEBAR###