Bugzilla will be upgraded to version 5.0 on a still to be determined date in the near future. The original upgrade date has been delayed.
Bug 1543717 - (CVE-2018-1298) CVE-2018-1298 qpid-java: Incorrect implementation of some SASL mechanisms can allow a remote unauthenticated attacker to cause a denial of service
CVE-2018-1298 qpid-java: Incorrect implementation of some SASL mechanisms can...
Status: CLOSED NOTABUG
Product: Security Response
Classification: Other
Component: vulnerability (Show other bugs)
unspecified
All Linux
high Severity high
: ---
: ---
Assigned To: Red Hat Product Security
impact=important,public=20171121,repo...
: Security
Depends On: 1543718
Blocks: 1543719
  Show dependency treegraph
 
Reported: 2018-02-09 00:12 EST by Sam Fowler
Modified: 2018-02-11 23:59 EST (History)
15 users (show)

See Also:
Fixed In Version: qpid-java 7.0.1
Doc Type: If docs needed, set a value
Doc Text:
Story Points: ---
Clone Of:
Environment:
Last Closed: 2018-02-11 23:59:43 EST
Type: ---
Regression: ---
Mount Type: ---
Documentation: ---
CRM:
Verified Versions:
Category: ---
oVirt Team: ---
RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: ---


Attachments (Terms of Use)

  None (edit)
Description Sam Fowler 2018-02-09 00:12:13 EST
A Denial of Service vulnerability was found in Apache Qpid Broker-J 7.0.0 in functionality for authentication of connections for AMQP protocols 0-8, 0-9, 0-91 and 0-10 when PLAIN or XOAUTH2 SASL mechanism is used. The vulnerability allows an unauthenticated attacker to crash the broker instance. AMQP 1.0 and HTTP connections are not affected.

The following Authentication Providers support PLAIN SAML and are affected:
- Plain
- PlainPasswordFile
- SimpleLDAP
- Base64MD5PasswordFile
- MD5
- SCRAM-SHA-256
- SCRAM-SHA-1

The following Authentication Providers support XOAUTH2 SAML and are affected:
- OAuth2

The current implementation of SASL mechanisms PLAIN and XOAUTH2 require from client to provide an initial response. PLAIN and XOAUTH2 sasl mechanism implementations should send challenge (empty bytes) if initial response is not provided.


Upstream Issue:

https://issues.apache.org/jira/browse/QPID-8046


Upstream Patches:

https://git-wip-us.apache.org/repos/asf?p=qpid-broker-j.git;h=de509dd
https://git-wip-us.apache.org/repos/asf?p=qpid-broker-j.git;h=30ca170
https://git-wip-us.apache.org/repos/asf?p=qpid-broker-j.git;h=4b9fb37


External References:

https://tools.ietf.org/html/rfc4616
Comment 1 Sam Fowler 2018-02-09 00:16:26 EST
Created qpid-java tracking bugs for this issue:

Affects: fedora-all [bug 1543718]
Comment 2 Kurt Seifried 2018-02-09 11:33:43 EST
Satellite 6 uses qpid-cpp, not qpid-java, so removing from affected.
Comment 3 Jason Shepherd 2018-02-11 23:41:28 EST
The affected Java classes are not present in MRG-2, or MRG-M-3. They were added in version 7 of qpid-broker-j which is the upstream project.
Comment 4 Jason Shepherd 2018-02-11 23:43:30 EST
JBoss A-MQ, and Fuse only contain the qpid client libraries, not the broker implementation.

Note You need to log in before you can comment on or make changes to this bug.