[ASA-202106-17] rabbitmq: denial of service

Jonas Witschel diabonas at archlinux.org
Thu Jun 3 08:44:47 UTC 2021


Arch Linux Security Advisory ASA-202106-17
==========================================

Severity: Medium
Date    : 2021-06-01
CVE-ID  : CVE-2021-22116
Package : rabbitmq
Type    : denial of service
Remote  : Yes
Link    : https://security.archlinux.org/AVG-1966

Summary
=======

The package rabbitmq before version 3.8.16-1 is vulnerable to denial of
service.

Resolution
==========

Upgrade to 3.8.16-1.

# pacman -Syu "rabbitmq>=3.8.16-1"

The problem has been fixed upstream in version 3.8.16.

Workaround
==========

None.

Description
===========

RabbitMQ all versions prior to 3.8.16 are prone to a denial of service
vulnerability due to improper input validation in AMQP 1.0 client
connection endpoint.

An attacker can exploit the vulnerability by sending malicious AMQP
messages to the target RabbitMQ instance having the AMQP 1.0 plugin
enabled.

Impact
======

A remote attacker could crash the RabbitMQ server through crafted AMQP
messages.

References
==========

https://tanzu.vmware.com/security/cve-2021-22116
https://security.archlinux.org/CVE-2021-22116
-------------- next part --------------
A non-text attachment was scrubbed...
Name: signature.asc
Type: application/pgp-signature
Size: 833 bytes
Desc: not available
URL: <https://lists.archlinux.org/pipermail/arch-security/attachments/20210603/f33c6c5f/attachment.sig>


More information about the arch-security mailing list