Bug 817175 (CVE-2012-2145)
Summary: | CVE-2012-2145 qpid-cpp: not closing incomplete connections exhausts file descriptors, leading to DoS | ||
---|---|---|---|
Product: | [Other] Security Response | Reporter: | Vincent Danen <vdanen> |
Component: | vulnerability | Assignee: | Red Hat Product Security <security-response-team> |
Status: | CLOSED ERRATA | QA Contact: | |
Severity: | medium | Docs Contact: | |
Priority: | medium | ||
Version: | unspecified | CC: | iboverma, jross, kim.vdriet, messaging-bugs, rdassen, security-response-team, tkramer |
Target Milestone: | --- | Keywords: | Security |
Target Release: | --- | ||
Hardware: | All | ||
OS: | Linux | ||
Whiteboard: | |||
Fixed In Version: | Doc Type: | Bug Fix | |
Doc Text: | Story Points: | --- | |
Clone Of: | Environment: | ||
Last Closed: | 2012-09-19 19:51:32 UTC | Type: | --- |
Regression: | --- | Mount Type: | --- |
Documentation: | --- | CRM: | |
Verified Versions: | Category: | --- | |
oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |
Cloudforms Team: | --- | Target Upstream Version: | |
Embargoed: | |||
Bug Depends On: | 609685, 820298 | ||
Bug Blocks: | 817177 |
Description
Vincent Danen
2012-04-27 22:18:21 UTC
To work-around this issue, you can use the iptables connlimit feature to the qpid broker port so that any IP/Host gets a limited number of connections: /sbin/iptables -A INPUT -p tcp --syn --dport $brokerPort -m connlimit --connlimit-above N -j REJECT --reject-with tcp-reset Created qpid-cpp tracking bugs for this issue Affects: fedora-all [bug 820298] This is corrected in upstream svn: http://svn.apache.org/viewvc?view=revision&revision=1341263 Sorry, it was _partially_ corrected upstream. See QPID-4021 (https://issues.apache.org/jira/browse/QPID-4021) where it notes that the default timeout still leaves a gap for where a misbehaving client can tie up the broker. This has not yet been corrected upstream. As well, the commit noted in #c5 is the second third of the fix, the first third is: http://svn.apache.org/viewvc?view=revision&revision=1341262 We are still waiting for the fix to fully resolve the flaw (QPID-4021). Additional related commits: http://svn.apache.org/viewvc?view=revision&revision=1331549 http://svn.apache.org/viewvc?view=revision&revision=1332788 which add per-user and per-IP connection limits (acl-max-connect-per-user and acl-max-connect-per-ip). This issue has been addressed in following products: MRG for RHEL-5 v. 2 Via RHSA-2012:1277 https://rhn.redhat.com/errata/RHSA-2012-1277.html This issue has been addressed in following products: Red Hat Enterprise Linux 6 Via RHSA-2012:1269 https://rhn.redhat.com/errata/RHSA-2012-1269.html Statement: (none) |