Bugzilla will be upgraded to version 5.0 on a still to be determined date in the near future. The original upgrade date has been delayed.
Bug 1198306 - (CVE-2014-3576) CVE-2014-3576 ActiveMQ: DoS via unauthenticated remote shutdown command
CVE-2014-3576 ActiveMQ: DoS via unauthenticated remote shutdown command
Status: CLOSED CURRENTRELEASE
Product: Security Response
Classification: Other
Component: vulnerability (Show other bugs)
unspecified
All Linux
medium Severity medium
: ---
: ---
Assigned To: Red Hat Product Security
impact=moderate,public=20150717,repor...
: Security
Depends On:
Blocks: 1130476
  Show dependency treegraph
 
Reported: 2015-03-03 13:48 EST by Chess Hazlett
Modified: 2015-09-14 11:26 EDT (History)
6 users (show)

See Also:
Fixed In Version: ActiveMQ 5.10.1, ActiveMQ 5.11.0
Doc Type: Bug Fix
Doc Text:
It was found that the Apache ActiveMQ broker exposed a remote shutdown command without requiring any authentication to use it. A remote, unauthenticated attacker could use this flaw to shut down ActiveMQ broker's listener.
Story Points: ---
Clone Of:
Environment:
Last Closed: 2015-06-30 20:06:07 EDT
Type: ---
Regression: ---
Mount Type: ---
Documentation: ---
CRM:
Verified Versions:
Category: ---
oVirt Team: ---
RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: ---


Attachments (Terms of Use)

  None (edit)
Description Chess Hazlett 2015-03-03 13:48:51 EST
It was found that Apache ActiveMQ broker exposed a remote shutdown
command that was possible to call without authentication, permitting
Denial of Service attacks.

Description:
It is possible to shutdown an ActiveMQ broker's listener remotely without
authentication. The offending network packet is sent to the same port as
a message consumer or producer would connect to. If the port is exposed,
the attack will be possible.

The attack is carried out via an undocumented "shutdown control
command". As a response to this command, the ActiveMQ broker will call
"System.exit(0)". Therefore, the broker will stop listening on its
network port, making future remote connections fail.

It was observed that the broker does not actually shut down fully (i.e.,
the Java process continues to run but no further remote connections are
processed). This may indicate that Java shutdown hooks are running
indefinitely. This should be assessed from a functional and security
impact point of view. E.g.:
  * Any automated restart scripts may think the broker is still alive
  * Transactions may be left in an undetermined state
  * Resources may not be released properly

Note You need to log in before you can comment on or make changes to this bug.