Risk | High |
Patch available | YES |
Number of vulnerabilities | 15 |
CVE-ID | CVE-2023-26048 CVE-2023-34462 CVE-2023-34455 CVE-2023-34454 CVE-2023-34453 CVE-2023-33201 CVE-2023-26049 CVE-2023-3635 CVE-2021-37136 CVE-2023-2976 CVE-2023-0482 CVE-2022-36944 CVE-2022-24823 CVE-2022-1471 CVE-2021-37137 |
CWE-ID | CWE-400 CWE-190 CWE-90 CWE-20 CWE-681 CWE-276 CWE-377 CWE-502 CWE-378 |
Exploitation vector | Network |
Public exploit |
Public exploit code for vulnerability #12 is available. Public exploit code for vulnerability #14 is available. |
Vulnerable software Subscribe |
AMQ Streams Server applications / Application servers |
Vendor | Red Hat Inc. |
Security Bulletin
This security bulletin contains information about 15 vulnerabilities.
EUVDB-ID: #VU75218
Risk: Medium
CVSSv3.1:
CVE-ID: CVE-2023-26048
CWE-ID:
Exploit availability:
DescriptionThe vulnerability allows a remote attacker to perform a denial of service (DoS) attack.
The vulnerability exists due to application does not properly control consumption of internal resources when processing multipart requests in request.getParameter(). A remote attacker can trigger resource exhaustion and perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's website.
AMQ Streams: before 2.5.0
Fixed software versionsCPE2.3 External links
http://access.redhat.com/errata/RHSA-2023:5165
Q & A
Can this vulnerability be exploited remotely?
Is there known malware, which exploits this vulnerability?
EUVDB-ID: #VU77573
Risk: Medium
CVSSv3.1:
CVE-ID: CVE-2023-34462
CWE-ID:
Exploit availability:
DescriptionThe vulnerability allows a remote attacker to perform a denial of service (DoS) attack.
The vulnerability exists due to application does not properly control consumption of internal resources if no idle timeout handler was configured. A remote attacker can send a client hello packet, which leads the server to buffer up to 16MB of data per connection and results in a denial of service condition.
Install updates from vendor's website.
AMQ Streams: before 2.5.0
Fixed software versionsCPE2.3 External links
http://access.redhat.com/errata/RHSA-2023:5165
Q & A
Can this vulnerability be exploited remotely?
Is there known malware, which exploits this vulnerability?
EUVDB-ID: #VU77362
Risk: Medium
CVSSv3.1:
CVE-ID: CVE-2023-34455
CWE-ID:
Exploit availability:
DescriptionThe vulnerability allows a remote attacker to perform a denial of service (DoS) attack.
The vulnerability exists due to application does not properly control consumption of internal resources. A remote attacker can trigger resource exhaustion and perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's website.
AMQ Streams: before 2.5.0
Fixed software versionsCPE2.3 External links
http://access.redhat.com/errata/RHSA-2023:5165
Q & A
Can this vulnerability be exploited remotely?
Is there known malware, which exploits this vulnerability?
EUVDB-ID: #VU77361
Risk: Medium
CVSSv3.1:
CVE-ID: CVE-2023-34454
CWE-ID:
Exploit availability:
DescriptionThe vulnerability allows a remote attacker to perform a denial of service (DoS) attack.
The vulnerability exists due to integer overflow in compress. A remote attacker can pass specially crafted data to the application, trigger integer overflow and cause a denial of service condition on the target system.
MitigationInstall updates from vendor's website.
AMQ Streams: before 2.5.0
Fixed software versionsCPE2.3 External links
http://access.redhat.com/errata/RHSA-2023:5165
Q & A
Can this vulnerability be exploited remotely?
Is there known malware, which exploits this vulnerability?
EUVDB-ID: #VU77359
Risk: Medium
CVSSv3.1:
CVE-ID: CVE-2023-34453
CWE-ID:
Exploit availability:
DescriptionThe vulnerability allows a remote attacker to perform a denial of service (DoS) attack.
The vulnerability exists due to integer overflow in shuffle. A remote attacker can pass specially crafted data to the application, trigger integer overflow and cause a denial of service condition on the target system.
MitigationInstall updates from vendor's website.
AMQ Streams: before 2.5.0
Fixed software versionsCPE2.3 External links
http://access.redhat.com/errata/RHSA-2023:5165
Q & A
Can this vulnerability be exploited remotely?
Is there known malware, which exploits this vulnerability?
EUVDB-ID: #VU78328
Risk: Medium
CVSSv3.1:
CVE-ID: CVE-2023-33201
CWE-ID:
Exploit availability:
DescriptionThe vulnerability allows a remote attacker to bypass authentication process.
The vulnerability exists due to improper input validation in applications that use an LDAP CertStore from Bouncy Castle to validate X.509 certificates. During the certificate validation process, Bouncy Castle inserts the certificate's Subject Name into an LDAP search filter without any escaping, which leads to an LDAP injection vulnerability. A remote non-authenticated attacker can use a specially crafted X.509 certificate to bypass authentication process and gain unauthorized access to the application.
MitigationInstall updates from vendor's website.
AMQ Streams: before 2.5.0
Fixed software versionsCPE2.3 External links
http://access.redhat.com/errata/RHSA-2023:5165
Q & A
Can this vulnerability be exploited remotely?
Is there known malware, which exploits this vulnerability?
EUVDB-ID: #VU75217
Risk: Low
CVSSv3.1:
CVE-ID: CVE-2023-26049
CWE-ID:
Exploit availability:
DescriptionThe vulnerability allows a remote attacker to gain access to sensitive information.
The vulnerability exists due to insufficient input validation when parsing cookies. A remote attacker can send a specially crafted HTTP request with a cookie value that starts with a double quote and force the application to read the cookie string until it sees a closing quote. Such behavior can be used to exfiltrate sensitive values from other cookies.
Install updates from vendor's website.
AMQ Streams: before 2.5.0
Fixed software versionsCPE2.3 External links
http://access.redhat.com/errata/RHSA-2023:5165
Q & A
Can this vulnerability be exploited remotely?
Is there known malware, which exploits this vulnerability?
EUVDB-ID: #VU80783
Risk: Medium
CVSSv3.1:
CVE-ID: CVE-2023-3635
CWE-ID:
Exploit availability:
DescriptionThe vulnerability allows a remote attacker to perform a denial of service (DoS) attack.
The vulnerability exists due to GzipSource does not handle an exception that might be raised when parsing a malformed gzip buffer. A remote attacker can trigger resource exhaustion and perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's website.
AMQ Streams: before 2.5.0
Fixed software versionsCPE2.3 External links
http://access.redhat.com/errata/RHSA-2023:5165
Q & A
Can this vulnerability be exploited remotely?
Is there known malware, which exploits this vulnerability?
EUVDB-ID: #VU63127
Risk: Medium
CVSSv3.1:
CVE-ID: CVE-2021-37136
CWE-ID:
Exploit availability:
DescriptionThe vulnerability allows a remote attacker to perform a denial of service (DoS) attack.
The vulnerability exists due to application does not properly control consumption of internal resources in Bzip2 decompression decoder function. A remote attacker can trigger resource exhaustion and perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's website.
AMQ Streams: before 2.5.0
Fixed software versionsCPE2.3 External links
http://access.redhat.com/errata/RHSA-2023:5165
Q & A
Can this vulnerability be exploited remotely?
Is there known malware, which exploits this vulnerability?
EUVDB-ID: #VU77107
Risk: Low
CVSSv3.1:
CVE-ID: CVE-2023-2976
CWE-ID:
Exploit availability:
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to incorrect default permissions in com.google.common.io.FileBackedOutputStream. A local user with access to the system can view contents of files and directories or modify them.
MitigationInstall updates from vendor's website.
AMQ Streams: before 2.5.0
Fixed software versionsCPE2.3 External links
http://access.redhat.com/errata/RHSA-2023:5165
Q & A
Can this vulnerability be exploited remotely?
Is there known malware, which exploits this vulnerability?
EUVDB-ID: #VU72075
Risk: Low
CVSSv3.1:
CVE-ID: CVE-2023-0482
CWE-ID:
Exploit availability:
DescriptionThe vulnerability allows a local user to gain access to sensitive information.
The vulnerability exists due to insecure creation of temporary files. A local user can gain access to sensitive information.
Install updates from vendor's website.
AMQ Streams: before 2.5.0
Fixed software versionsCPE2.3 External links
http://access.redhat.com/errata/RHSA-2023:5165
Q & A
Can this vulnerability be exploited remotely?
Is there known malware, which exploits this vulnerability?
EUVDB-ID: #VU70531
Risk: High
CVSSv3.1:
CVE-ID: CVE-2022-36944
CWE-ID:
Exploit availability:
DescriptionThe vulnerability allows a remote attacker to execute arbitrary code on the target system.
The vulnerability exists due to insecure input validation when processing serialized data during Java object deserialization. A remote attacker can pass specially crafted data to the application and execute arbitrary code on the target system.
Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.
MitigationInstall updates from vendor's website.
AMQ Streams: before 2.5.0
Fixed software versionsCPE2.3 External links
http://access.redhat.com/errata/RHSA-2023:5165
Q & A
Can this vulnerability be exploited remotely?
Is there known malware, which exploits this vulnerability?
EUVDB-ID: #VU62849
Risk: Low
CVSSv3.1:
CVE-ID: CVE-2022-24823
CWE-ID:
Exploit availability:
DescriptionThe vulnerability allows a local user to gain access to sensitive information.
The vulnerability exists due to usage of insecure permissions for temporary files. A local user can view contents of temporary files and gain access to sensitive information.
Install updates from vendor's website.
AMQ Streams: before 2.5.0
Fixed software versionsCPE2.3 External links
http://access.redhat.com/errata/RHSA-2023:5165
Q & A
Can this vulnerability be exploited remotely?
Is there known malware, which exploits this vulnerability?
EUVDB-ID: #VU70385
Risk: High
CVSSv3.1:
CVE-ID: CVE-2022-1471
CWE-ID:
Exploit availability:
DescriptionThe vulnerability allows a remote attacker to execute arbitrary code on the target system.
The vulnerability exists due to insecure input validation when processing serialized data within the SnakeYaml's Constructor() class. A remote attacker can pass specially crafted yaml content to the application and execute arbitrary code on the target system.
Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.
MitigationInstall updates from vendor's website.
AMQ Streams: before 2.5.0
Fixed software versionsCPE2.3 External links
http://access.redhat.com/errata/RHSA-2023:5165
Q & A
Can this vulnerability be exploited remotely?
Is there known malware, which exploits this vulnerability?
EUVDB-ID: #VU59924
Risk: Medium
CVSSv3.1:
CVE-ID: CVE-2021-37137
CWE-ID:
Exploit availability:
DescriptionThe vulnerability allows a remote non-authenticated attacker to perform a denial of service (DoS) attack.
The vulnerability exists due to improper input validation within the Content Acquisition System (Netty) component in Oracle Commerce Guided Search. A remote non-authenticated attacker can exploit this vulnerability to perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's website.
AMQ Streams: before 2.5.0
Fixed software versionsCPE2.3 External links
http://access.redhat.com/errata/RHSA-2023:5165
Q & A
Can this vulnerability be exploited remotely?
Is there known malware, which exploits this vulnerability?