Show plain JSON{"acknowledgement": "This issue was discovered by Florian Weimer (Red Hat Product Security Team).", "affected_release": [{"advisory": "RHSA-2013:0561", "cpe": "cpe:/a:redhat:enterprise_mrg:2::el5", "package": "cumin-messaging-0:0.1.1-2.el5", "product_name": "MRG for RHEL-5 v. 2", "release_date": "2013-03-06T00:00:00Z"}, {"advisory": "RHSA-2013:0561", "cpe": "cpe:/a:redhat:enterprise_mrg:2::el5", "package": "mrg-release-0:2.3.0-1.el5", "product_name": "MRG for RHEL-5 v. 2", "release_date": "2013-03-06T00:00:00Z"}, {"advisory": "RHSA-2013:0561", "cpe": "cpe:/a:redhat:enterprise_mrg:2::el5", "package": "python-qpid-0:0.18-4.el5", "product_name": "MRG for RHEL-5 v. 2", "release_date": "2013-03-06T00:00:00Z"}, {"advisory": "RHSA-2013:0561", "cpe": "cpe:/a:redhat:enterprise_mrg:2::el5", "package": "qpid-cpp-mrg-0:0.18-14.el5", "product_name": "MRG for RHEL-5 v. 2", "release_date": "2013-03-06T00:00:00Z"}, {"advisory": "RHSA-2013:0561", "cpe": "cpe:/a:redhat:enterprise_mrg:2::el5", "package": "qpid-java-0:0.18-7.el5", "product_name": "MRG for RHEL-5 v. 2", "release_date": "2013-03-06T00:00:00Z"}, {"advisory": "RHSA-2013:0561", "cpe": "cpe:/a:redhat:enterprise_mrg:2::el5", "package": "qpid-jca-0:0.18-8.el5", "product_name": "MRG for RHEL-5 v. 2", "release_date": "2013-03-06T00:00:00Z"}, {"advisory": "RHSA-2013:0561", "cpe": "cpe:/a:redhat:enterprise_mrg:2::el5", "package": "qpid-qmf-0:0.18-15.el5", "product_name": "MRG for RHEL-5 v. 2", "release_date": "2013-03-06T00:00:00Z"}, {"advisory": "RHSA-2013:0561", "cpe": "cpe:/a:redhat:enterprise_mrg:2::el5", "package": "qpid-tests-0:0.18-2.el5", "product_name": "MRG for RHEL-5 v. 2", "release_date": "2013-03-06T00:00:00Z"}, {"advisory": "RHSA-2013:0561", "cpe": "cpe:/a:redhat:enterprise_mrg:2::el5", "package": "qpid-tools-0:0.18-8.el5", "product_name": "MRG for RHEL-5 v. 2", "release_date": "2013-03-06T00:00:00Z"}, {"advisory": "RHSA-2013:0561", "cpe": "cpe:/a:redhat:enterprise_mrg:2::el5", "package": "rhm-docs-0:0.18-2.el5", "product_name": "MRG for RHEL-5 v. 2", "release_date": "2013-03-06T00:00:00Z"}, {"advisory": "RHSA-2013:0561", "cpe": "cpe:/a:redhat:enterprise_mrg:2::el5", "package": "saslwrapper-0:0.18-1.el5", "product_name": "MRG for RHEL-5 v. 2", "release_date": "2013-03-06T00:00:00Z"}, {"advisory": "RHSA-2013:0562", "cpe": "cpe:/a:redhat:enterprise_mrg:2:server:el6", "package": "cumin-messaging-0:0.1.1-2.el6", "product_name": "Red Hat Enterprise MRG 2", "release_date": "2013-03-06T00:00:00Z"}, {"advisory": "RHSA-2013:0562", "cpe": "cpe:/a:redhat:enterprise_mrg:2:server:el6", "package": "mrg-release-0:2.3.0-1.el6", "product_name": "Red Hat Enterprise MRG 2", "release_date": "2013-03-06T00:00:00Z"}, {"advisory": "RHSA-2013:0562", "cpe": "cpe:/a:redhat:enterprise_mrg:2:server:el6", "package": "python-qpid-0:0.18-4.el6", "product_name": "Red Hat Enterprise MRG 2", "release_date": "2013-03-06T00:00:00Z"}, {"advisory": "RHSA-2013:0562", "cpe": "cpe:/a:redhat:enterprise_mrg:2:server:el6", "package": "qpid-cpp-0:0.18-14.el6", "product_name": "Red Hat Enterprise MRG 2", "release_date": "2013-03-06T00:00:00Z"}, {"advisory": "RHSA-2013:0562", "cpe": "cpe:/a:redhat:enterprise_mrg:2:server:el6", "package": "qpid-java-0:0.18-7.el6", "product_name": "Red Hat Enterprise MRG 2", "release_date": "2013-03-06T00:00:00Z"}, {"advisory": "RHSA-2013:0562", "cpe": "cpe:/a:redhat:enterprise_mrg:2:server:el6", "package": "qpid-jca-0:0.18-8.el6", "product_name": "Red Hat Enterprise MRG 2", "release_date": "2013-03-06T00:00:00Z"}, {"advisory": "RHSA-2013:0562", "cpe": "cpe:/a:redhat:enterprise_mrg:2:server:el6", "package": "qpid-qmf-0:0.18-15.el6", "product_name": "Red Hat Enterprise MRG 2", "release_date": "2013-03-06T00:00:00Z"}, {"advisory": "RHSA-2013:0562", "cpe": "cpe:/a:redhat:enterprise_mrg:2:server:el6", "package": "qpid-tests-0:0.18-2.el6", "product_name": "Red Hat Enterprise MRG 2", "release_date": "2013-03-06T00:00:00Z"}, {"advisory": "RHSA-2013:0562", "cpe": "cpe:/a:redhat:enterprise_mrg:2:server:el6", "package": "qpid-tools-0:0.18-8.el6", "product_name": "Red Hat Enterprise MRG 2", "release_date": "2013-03-06T00:00:00Z"}, {"advisory": "RHSA-2013:0562", "cpe": "cpe:/a:redhat:enterprise_mrg:2:server:el6", "package": "rhm-docs-0:0.18-2.el6", "product_name": "Red Hat Enterprise MRG 2", "release_date": "2013-03-06T00:00:00Z"}, {"advisory": "RHSA-2013:0562", "cpe": "cpe:/a:redhat:enterprise_mrg:2:server:el6", "package": "rubygem-rake-0:0.8.7-2.1.el6", "product_name": "Red Hat Enterprise MRG 2", "release_date": "2013-03-06T00:00:00Z"}, {"advisory": "RHSA-2013:0562", "cpe": "cpe:/a:redhat:enterprise_mrg:2:server:el6", "package": "rubygems-0:1.8.16-1.el6", "product_name": "Red Hat Enterprise MRG 2", "release_date": "2013-03-06T00:00:00Z"}, {"advisory": "RHSA-2013:0562", "cpe": "cpe:/a:redhat:enterprise_mrg:2:server:el6", "package": "saslwrapper-0:0.18-1.el6_3", "product_name": "Red Hat Enterprise MRG 2", "release_date": "2013-03-06T00:00:00Z"}, {"advisory": "RHSA-2013:0562", "cpe": "cpe:/a:redhat:enterprise_mrg:2:server:el6", "package": "xerces-c-0:3.0.1-20.el6", "product_name": "Red Hat Enterprise MRG 2", "release_date": "2013-03-06T00:00:00Z"}, {"advisory": "RHSA-2013:0562", "cpe": "cpe:/a:redhat:enterprise_mrg:2:server:el6", "package": "xqilla-0:2.2.3-8.el6", "product_name": "Red Hat Enterprise MRG 2", "release_date": "2013-03-06T00:00:00Z"}], "bugzilla": {"description": "qpid-cpp: qpid authentication bypass", "id": "851355", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=851355"}, "csaw": false, "cvss": {"cvss_base_score": "5.8", "cvss_scoring_vector": "AV:N/AC:M/Au:N/C:P/I:P/A:N", "status": "verified"}, "details": ["The default configuration for Apache Qpid 0.20 and earlier, when the federation_tag attribute is enabled, accepts AMQP connections without checking the source user ID, which allows remote attackers to bypass authentication and have other unspecified impact via an AMQP request.", "It was found that the Apache Qpid daemon (qpidd) treated AMQP connections with the federation_tag attribute set as a broker-to-broker connection, rather than a client-to-server connection. This resulted in the source user ID of messages not being checked. A client that can establish an AMQP connection with the broker could use this flaw to bypass intended authentication. For Condor users, if condor-aviary is installed, this flaw could be used to submit jobs that would run as any user (except root, as Condor does not run jobs as root)."], "name": "CVE-2012-4446", "package_state": [{"cpe": "cpe:/o:redhat:enterprise_linux:6", "fix_state": "Affected", "package_name": "qpid-cpp", "product_name": "Red Hat Enterprise Linux 6"}], "public_date": "2013-03-06T00:00:00Z", "references": ["https://www.cve.org/CVERecord?id=CVE-2012-4446\nhttps://nvd.nist.gov/vuln/detail/CVE-2012-4446\nhttps://issues.apache.org/jira/browse/QPID-4631"], "threat_severity": "Moderate"}