漏洞信息详情
Apache ActiveMQ Client 信任管理问题漏洞
漏洞简介
Apache ActiveMQ Client是美国阿帕奇(Apache)软件基金会所研发的一套开源消息中间件的客户端程序,它支持Java消息服务、集群、Spring Framework等。
Apache ActiveMQ Client 5.15.6之前版本中存在安全漏洞,该漏洞源于客户端缺少对TLS主机名的验证。攻击者可利用该漏洞在使用ActiveMQ客户端的Java应用程序和ActiveMQ server之间实施中间人攻击。
漏洞公告
目前厂商已发布升级补丁以修复漏洞,补丁获取链接:
http://activemq.apache.org/security-advisories.data/CVE-2018-11775-announcement.txt
参考网址
来源:MISC
链接:https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html
来源:MLIST
链接:https://lists.apache.org/thread.html/a859563f05fbe7c31916b3178c2697165bd9bbf5a65d1cf62aef27d2@%3Ccommits.activemq.apache.org%3E
来源:MLIST
链接:https://lists.apache.org/thread.html/03f91b1fb85686a848cee6b90112cf6059bd1b21b23bacaa11a962e1@%3Cdev.activemq.apache.org%3E
来源:N/A
链接:https://www.oracle.com/security-alerts/cpuapr2020.html
来源:MISC
链接:https://www.oracle.com/security-alerts/cpujan2021.html
来源:MISC
链接:https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html
来源:www.oracle.com
链接:https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html
来源:activemq.apache.org
链接:http://activemq.apache.org/security-advisories.data/CVE-2018-11775-announcement.txt
来源:www.apache.org
链接:http://www.apache.org/
来源:BID
链接:http://www.securityfocus.com/bid/105335
来源:BID
链接:https://www.securityfocus.com/bid/105335
来源:MLIST
链接:https://lists.apache.org/thread.html/fcbe6ad00f1de142148c20d813fae3765dc4274955e3e2f3ca19ff7b@%3Cdev.activemq.apache.org%3E
来源:MLIST
链接:https://lists.debian.org/debian-lts-announce/2021/03/msg00005.html
来源:MLIST
链接:https://lists.apache.org/thread.html/2b5c0039197a4949f29e1e2c9441ab38d242946b966f61c110808bcc@%3Ccommits.activemq.apache.org%3E
来源:REDHAT
链接:https://access.redhat.com/errata/RHSA-2019:3892
来源:MLIST
链接:https://lists.apache.org/thread.html/rb698ed085f79e56146ca24ab359c9ef95846618675ea1ef402e04a6d@%3Ccommits.activemq.apache.org%3E
来源:SECTRACK
链接:http://www.securitytracker.com/id/1041618
来源:www.ibm.com
链接:https://www.ibm.com/support/pages/node/1105515
来源:www.ibm.com
链接:https://www.ibm.com/support/pages/node/1105497
来源:www.ibm.com
链接:https://www.ibm.com/support/pages/node/1105509
来源:www.ibm.com
链接:https://www.ibm.com/support/pages/node/1106577
来源:access.redhat.com
链接:https://access.redhat.com/errata/RHSA-2019:3892
来源:www.auscert.org.au
链接:https://www.auscert.org.au/bulletins/ESB-2021.0807
来源:www.ibm.com
链接:https://www.ibm.com/blogs/psirt/security-bulletin-apache-activemq-client-used-in-ibm-jazz-for-service-management-could-allow-a-remote-attacker-to-conduct-a-man-in-the-middle-attack-cve-2018-11775/
来源:www.ibm.com
链接:https://www.ibm.com/blogs/psirt/security-bulletin-resilient-is-vulnerable-to-using-components-with-known-vulnerabilities/
来源:www.securityfocus.com
链接:https://www.securityfocus.com/bid/105335
来源:packetstormsecurity.com
链接:https://packetstormsecurity.com/files/155352/Red-Hat-Security-Advisory-2019-3892-01.html
来源:www.ibm.com
链接:https://www.ibm.com/support/pages/node/1105479
来源:www.auscert.org.au
链接:https://www.auscert.org.au/bulletins/ESB-2019.4294/
来源:vigilance.fr
链接:https://vigilance.fr/vulnerability/Apache-ActiveMQ-Man-in-the-Middle-via-TLS-Hostname-Verification-33510
来源:www.auscert.org.au
链接:https://www.auscert.org.au/bulletins/ESB-2019.4332/
来源:www.auscert.org.au
链接:https://www.auscert.org.au/bulletins/ESB-2020.3485/
来源:www.ibm.com
链接:https://www.ibm.com/blogs/psirt/security-bulletin-cve-2018-11775-tls-hostname-verification-when-using-the-apache-activemq-client/
受影响实体
- Apache Activemq:5.13.3<!--2000-1-1-->
- Apache Activemq:5.13.1<!--2000-1-1-->
- Apache Activemq:5.11.3<!--2000-1-1-->
- Apache Activemq:5.12.0<!--2000-1-1-->
- Apache Activemq:5.12.1<!--2000-1-1-->
补丁
- Apache ActiveMQ Client 安全漏洞的修复措施<!--2018-9-11-->
还没有评论,来说两句吧...