CVE-2023-46118
Publication date 25 October 2023
Last updated 24 July 2024
Ubuntu priority
Cvss 3 Severity Score
RabbitMQ is a multi-protocol messaging and streaming broker. HTTP API did not enforce an HTTP request body limit, making it vulnerable for denial of service (DoS) attacks with very large messages. An authenticated user with sufficient credentials can publish a very large messages over the HTTP API and cause target node to be terminated by an "out-of-memory killer"-like mechanism. This vulnerability has been patched in versions 3.11.24 and 3.12.7.
Status
Package | Ubuntu Release | Status |
---|---|---|
rabbitmq-server | 24.10 oracular |
Fixed 3.12.1-1ubuntu1
|
24.04 LTS noble |
Fixed 3.12.1-1ubuntu1
|
|
22.04 LTS jammy |
Fixed 3.9.13-1ubuntu0.22.04.2
|
|
20.04 LTS focal |
Fixed 3.8.2-0ubuntu1.5
|
|
18.04 LTS bionic |
Needs evaluation
|
|
16.04 LTS xenial |
Needs evaluation
|
|
14.04 LTS trusty | Ignored end of standard support |
Patch details
Package | Patch details |
---|---|
rabbitmq-server |
|
Severity score breakdown
Parameter | Value |
---|---|
Base score | 4.9 · Medium |
Attack vector | Network |
Attack complexity | Low |
Privileges required | High |
User interaction | None |
Scope | Unchanged |
Confidentiality | None |
Integrity impact | None |
Availability impact | High |
Vector | CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H |
References
Related Ubuntu Security Notices (USN)
- USN-6501-1
- RabbitMQ vulnerability
- 21 November 2023