Pivotal RabbitMQ, versions 3.7.x prior to 3.7.21 and 3.8.x prior to 3.8.1, and RabbitMQ for Pivotal Platform, 1.16.x versions prior to 1.16.7 and 1.17.x versions prior to 1.17.4, contain a web management plugin that is vulnerable to a denial of service attack. The "X-Reason" HTTP Header can be leveraged to insert a malicious Erlang format string that will expand and consume the heap, resulting in the server crashing.
References
Link | Resource |
---|---|
https://pivotal.io/security/cve-2019-11287 | Vendor Advisory |
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PYTGR3D5FW2O25RXZOTIZMOD2HAUVBE4/ | Third Party Advisory |
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/EEQ6O7PMNJKYFMQYHAB55L423GYK63SO/ | Third Party Advisory |
https://access.redhat.com/errata/RHSA-2020:0078 | Third Party Advisory |
https://github.com/DrunkenShells/Disclosures/tree/master/CVE-2019-11287-DoS%20via%20Heap%20Overflow-RabbitMQ%20Web%20Management%20Plugin | Exploit Third Party Advisory |
https://lists.debian.org/debian-lts-announce/2021/07/msg00011.html | Third Party Advisory |
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
Configuration 3 (hide)
|
Configuration 4 (hide)
|
Information
Published : 2019-11-22 16:15
Updated : 2022-05-15 07:14
NVD link : CVE-2019-11287
Mitre link : CVE-2019-11287
JSON object : View
CWE
CWE-134
Use of Externally-Controlled Format String
Products Affected
redhat
- openstack
fedoraproject
- fedora
vmware
- rabbitmq
debian
- debian_linux
pivotal_software
- rabbitmq