#VU40671 Credentials management in Fedora and ActiveMQ


Published: 2015-08-24 | Updated: 2020-08-09

Vulnerability identifier: #VU40671

Vulnerability risk: Medium

CVSSv3.1: 4.6 [CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N/E:U/RL:O/RC:C]

CVE-ID: CVE-2015-6524

CWE-ID: CWE-255

Exploitation vector: Network

Exploit availability: No

Vulnerable software:
Fedora
Operating systems & Components / Operating system
ActiveMQ
Server applications / Mail servers

Vendor: Fedoraproject
Apache Foundation

Description

The vulnerability allows a remote non-authenticated attacker to gain access to sensitive information.

The LDAPLoginModule implementation in the Java Authentication and Authorization Service (JAAS) in Apache ActiveMQ 5.x before 5.10.1 allows wildcard operators in usernames, which allows remote attackers to obtain credentials via a brute force attack. NOTE: this identifier was SPLIT from CVE-2014-3612 per ADT2 due to different vulnerability types.

Mitigation
Install update from vendor's website.

Vulnerable software versions

Fedora: 22 - 23

ActiveMQ: 22 - 23, 5.0.0, 5.1.0, 5.2.0, 5.3.0 - 5.3.2, 5.4.0 - 5.4.3, 5.5.0 - 5.5.1, 5.6.0, 5.7.0, 5.8.0, 5.9.0 - 5.9.1, 5.10.0


External links
http://activemq.apache.org/security-advisories.data/CVE-2014-3612-announcement.txt
http://lists.fedoraproject.org/pipermail/package-announce/2015-October/168094.html
http://lists.fedoraproject.org/pipermail/package-announce/2015-October/168651.html


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.


Latest bulletins with this vulnerability