CVE Vulnerabilities

CVE-2012-4446

Improper Authentication

Published: Mar 14, 2013 | Modified: Apr 11, 2025
CVSS 3.x
N/A
Source:
NVD
CVSS 2.x
6.8 MEDIUM
AV:N/AC:M/Au:N/C:P/I:P/A:P
RedHat/V2
5.8 MODERATE
AV:N/AC:M/Au:N/C:P/I:P/A:N
RedHat/V3
Ubuntu
MEDIUM
root.io logo minimus.io logo echo.ai logo

The default configuration for Apache Qpid 0.20 and earlier, when the federation_tag attribute is enabled, accepts AMQP connections without checking the source user ID, which allows remote attackers to bypass authentication and have other unspecified impact via an AMQP request.

Weakness

When an actor claims to have a given identity, the product does not prove or insufficiently proves that the claim is correct.

Affected Software

NameVendorStart VersionEnd Version
QpidApache*0.20 (including)
QpidApache0.5 (including)0.5 (including)
QpidApache0.6 (including)0.6 (including)
QpidApache0.7 (including)0.7 (including)
QpidApache0.8 (including)0.8 (including)
QpidApache0.9 (including)0.9 (including)
QpidApache0.10 (including)0.10 (including)
QpidApache0.11 (including)0.11 (including)
QpidApache0.12 (including)0.12 (including)
QpidApache0.13 (including)0.13 (including)
QpidApache0.14 (including)0.14 (including)
QpidApache0.15 (including)0.15 (including)
QpidApache0.16 (including)0.16 (including)
QpidApache0.17 (including)0.17 (including)
QpidApache0.18 (including)0.18 (including)
QpidApache0.19 (including)0.19 (including)
MRG for RHEL-5 v. 2RedHatcumin-messaging-0:0.1.1-2.el5*
MRG for RHEL-5 v. 2RedHatmrg-release-0:2.3.0-1.el5*
MRG for RHEL-5 v. 2RedHatpython-qpid-0:0.18-4.el5*
MRG for RHEL-5 v. 2RedHatqpid-cpp-mrg-0:0.18-14.el5*
MRG for RHEL-5 v. 2RedHatqpid-java-0:0.18-7.el5*
MRG for RHEL-5 v. 2RedHatqpid-jca-0:0.18-8.el5*
MRG for RHEL-5 v. 2RedHatqpid-qmf-0:0.18-15.el5*
MRG for RHEL-5 v. 2RedHatqpid-tests-0:0.18-2.el5*
MRG for RHEL-5 v. 2RedHatqpid-tools-0:0.18-8.el5*
MRG for RHEL-5 v. 2RedHatrhm-docs-0:0.18-2.el5*
MRG for RHEL-5 v. 2RedHatsaslwrapper-0:0.18-1.el5*
Red Hat Enterprise MRG 2RedHatcumin-messaging-0:0.1.1-2.el6*
Red Hat Enterprise MRG 2RedHatmrg-release-0:2.3.0-1.el6*
Red Hat Enterprise MRG 2RedHatpython-qpid-0:0.18-4.el6*
Red Hat Enterprise MRG 2RedHatqpid-cpp-0:0.18-14.el6*
Red Hat Enterprise MRG 2RedHatqpid-java-0:0.18-7.el6*
Red Hat Enterprise MRG 2RedHatqpid-jca-0:0.18-8.el6*
Red Hat Enterprise MRG 2RedHatqpid-qmf-0:0.18-15.el6*
Red Hat Enterprise MRG 2RedHatqpid-tests-0:0.18-2.el6*
Red Hat Enterprise MRG 2RedHatqpid-tools-0:0.18-8.el6*
Red Hat Enterprise MRG 2RedHatrhm-docs-0:0.18-2.el6*
Red Hat Enterprise MRG 2RedHatrubygem-rake-0:0.8.7-2.1.el6*
Red Hat Enterprise MRG 2RedHatrubygems-0:1.8.16-1.el6*
Red Hat Enterprise MRG 2RedHatsaslwrapper-0:0.18-1.el6_3*
Red Hat Enterprise MRG 2RedHatxerces-c-0:3.0.1-20.el6*
Red Hat Enterprise MRG 2RedHatxqilla-0:2.2.3-8.el6*
Qpid-cppUbuntuartful*
Qpid-cppUbuntuesm-apps/xenial*
Qpid-cppUbuntuprecise*
Qpid-cppUbuntuquantal*
Qpid-cppUbunturaring*
Qpid-cppUbuntusaucy*
Qpid-cppUbuntutrusty*
Qpid-cppUbuntuupstream*
Qpid-cppUbuntuutopic*
Qpid-cppUbuntuvivid*
Qpid-cppUbuntuwily*
Qpid-cppUbuntuxenial*
Qpid-cppUbuntuyakkety*
Qpid-cppUbuntuzesty*

Potential Mitigations

References