CVE-2019-0223
23.04.2019, 16:29
While investigating bug PROTON-2014, we discovered that under some circumstances Apache Qpid Proton versions 0.9 to 0.27.0 (C library and its language bindings) can connect to a peer anonymously using TLS *even when configured to verify the peer certificate* while used with OpenSSL versions before 1.1.0. This means that an undetected man in the middle attack could be constructed if an attacker can arrange to intercept TLS traffic.Enginsight
Vendor | Product | Version |
---|---|---|
apache | qpid | 0.9 ≤ 𝑥 ≤ 0.27.0 |
redhat | jboss_amq_clients_2 | - |
redhat | satellite | 6.3 |
redhat | satellite | 6.4 |
redhat | satellite | 6.5 |
redhat | enterprise_linux_desktop | 6.0 |
redhat | enterprise_linux_desktop | 7.0 |
redhat | enterprise_linux_eus | 6.7 |
redhat | enterprise_linux_eus | 7.2 |
redhat | enterprise_linux_eus | 7.3 |
redhat | enterprise_linux_eus | 7.4 |
redhat | enterprise_linux_eus | 7.5 |
redhat | enterprise_linux_eus | 7.6 |
redhat | enterprise_linux_server | 6.0 |
redhat | enterprise_linux_server | 7.0 |
redhat | enterprise_linux_server_aus | 5.9 |
redhat | enterprise_linux_server_aus | 6.4 |
redhat | enterprise_linux_server_aus | 6.5 |
redhat | enterprise_linux_server_aus | 6.6 |
redhat | enterprise_linux_server_aus | 7.2 |
redhat | enterprise_linux_server_aus | 7.3 |
redhat | enterprise_linux_server_aus | 7.4 |
redhat | enterprise_linux_server_aus | 7.6 |
redhat | enterprise_linux_server_tus | 7.2 |
redhat | enterprise_linux_server_tus | 7.3 |
redhat | enterprise_linux_server_tus | 7.4 |
redhat | enterprise_linux_server_tus | 7.6 |
redhat | enterprise_linux_workstation | 6.0 |
redhat | enterprise_linux_workstation | 7.0 |
𝑥
= Vulnerable software versions

Debian Releases

Ubuntu Releases
References