CVE-2019-18609

An issue was discovered in amqp_handle_input in amqp_connection.c in rabbitmq-c 0.9.0. There is an integer overflow that leads to heap memory corruption in the handling of CONNECTION_STATE_HEADER. A rogue server could return a malicious frame header that leads to a smaller target_size value than needed. This condition is then carried on to a memcpy function that copies too much data into a heap buffer.
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTNIST
9.8 CRITICAL
NETWORK
LOW
NONE
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
mitreCNA
---
---
CVEADP
---
---
Base Score
CVSS 3.x
EPSS Score
Percentile: 83%
VendorProductVersion
rabbitmq-c_projectrabbitmq-c
𝑥
< 0.10.0
canonicalubuntu_linux
14.04
canonicalubuntu_linux
16.04
canonicalubuntu_linux
18.04
canonicalubuntu_linux
19.04
canonicalubuntu_linux
19.10
debiandebian_linux
8.0
𝑥
= Vulnerable software versions
Debian logo
Debian Releases
Debian Product
Codename
librabbitmq
bullseye
0.10.0-1
fixed
buster
no-dsa
stretch
no-dsa
bookworm
0.11.0-1
fixed
sid
0.14.0-1
fixed
trixie
0.14.0-1
fixed
Ubuntu logo
Ubuntu Releases
Ubuntu Product
Codename
librabbitmq
eoan
Fixed 0.9.0-0.2ubuntu0.19.10.1
released
disco
Fixed 0.9.0-0.2ubuntu0.19.04.1
released
bionic
Fixed 0.8.0-1ubuntu0.18.04.2
released
xenial
Fixed 0.7.1-1ubuntu0.2
released
trusty
Fixed 0.4.1-1ubuntu0.1~esm1
released