Show plain JSON{"acknowledgement": "This issue was discovered by Florian Weimer (Red Hat Product Security Team).", "affected_release": [{"advisory": "RHSA-2013:0561", "cpe": "cpe:/a:redhat:enterprise_mrg:2::el5", "package": "cumin-messaging-0:0.1.1-2.el5", "product_name": "MRG for RHEL-5 v. 2", "release_date": "2013-03-06T00:00:00Z"}, {"advisory": "RHSA-2013:0561", "cpe": "cpe:/a:redhat:enterprise_mrg:2::el5", "package": "mrg-release-0:2.3.0-1.el5", "product_name": "MRG for RHEL-5 v. 2", "release_date": "2013-03-06T00:00:00Z"}, {"advisory": "RHSA-2013:0561", "cpe": "cpe:/a:redhat:enterprise_mrg:2::el5", "package": "python-qpid-0:0.18-4.el5", "product_name": "MRG for RHEL-5 v. 2", "release_date": "2013-03-06T00:00:00Z"}, {"advisory": "RHSA-2013:0561", "cpe": "cpe:/a:redhat:enterprise_mrg:2::el5", "package": "qpid-cpp-mrg-0:0.18-14.el5", "product_name": "MRG for RHEL-5 v. 2", "release_date": "2013-03-06T00:00:00Z"}, {"advisory": "RHSA-2013:0561", "cpe": "cpe:/a:redhat:enterprise_mrg:2::el5", "package": "qpid-java-0:0.18-7.el5", "product_name": "MRG for RHEL-5 v. 2", "release_date": "2013-03-06T00:00:00Z"}, {"advisory": "RHSA-2013:0561", "cpe": "cpe:/a:redhat:enterprise_mrg:2::el5", "package": "qpid-jca-0:0.18-8.el5", "product_name": "MRG for RHEL-5 v. 2", "release_date": "2013-03-06T00:00:00Z"}, {"advisory": "RHSA-2013:0561", "cpe": "cpe:/a:redhat:enterprise_mrg:2::el5", "package": "qpid-qmf-0:0.18-15.el5", "product_name": "MRG for RHEL-5 v. 2", "release_date": "2013-03-06T00:00:00Z"}, {"advisory": "RHSA-2013:0561", "cpe": "cpe:/a:redhat:enterprise_mrg:2::el5", "package": "qpid-tests-0:0.18-2.el5", "product_name": "MRG for RHEL-5 v. 2", "release_date": "2013-03-06T00:00:00Z"}, {"advisory": "RHSA-2013:0561", "cpe": "cpe:/a:redhat:enterprise_mrg:2::el5", "package": "qpid-tools-0:0.18-8.el5", "product_name": "MRG for RHEL-5 v. 2", "release_date": "2013-03-06T00:00:00Z"}, {"advisory": "RHSA-2013:0561", "cpe": "cpe:/a:redhat:enterprise_mrg:2::el5", "package": "rhm-docs-0:0.18-2.el5", "product_name": "MRG for RHEL-5 v. 2", "release_date": "2013-03-06T00:00:00Z"}, {"advisory": "RHSA-2013:0561", "cpe": "cpe:/a:redhat:enterprise_mrg:2::el5", "package": "saslwrapper-0:0.18-1.el5", "product_name": "MRG for RHEL-5 v. 2", "release_date": "2013-03-06T00:00:00Z"}, {"advisory": "RHSA-2013:0562", "cpe": "cpe:/a:redhat:enterprise_mrg:2:server:el6", "package": "cumin-messaging-0:0.1.1-2.el6", "product_name": "Red Hat Enterprise MRG 2", "release_date": "2013-03-06T00:00:00Z"}, {"advisory": "RHSA-2013:0562", "cpe": "cpe:/a:redhat:enterprise_mrg:2:server:el6", "package": "mrg-release-0:2.3.0-1.el6", "product_name": "Red Hat Enterprise MRG 2", "release_date": "2013-03-06T00:00:00Z"}, {"advisory": "RHSA-2013:0562", "cpe": "cpe:/a:redhat:enterprise_mrg:2:server:el6", "package": "python-qpid-0:0.18-4.el6", "product_name": "Red Hat Enterprise MRG 2", "release_date": "2013-03-06T00:00:00Z"}, {"advisory": "RHSA-2013:0562", "cpe": "cpe:/a:redhat:enterprise_mrg:2:server:el6", "package": "qpid-cpp-0:0.18-14.el6", "product_name": "Red Hat Enterprise MRG 2", "release_date": "2013-03-06T00:00:00Z"}, {"advisory": "RHSA-2013:0562", "cpe": "cpe:/a:redhat:enterprise_mrg:2:server:el6", "package": "qpid-java-0:0.18-7.el6", "product_name": "Red Hat Enterprise MRG 2", "release_date": "2013-03-06T00:00:00Z"}, {"advisory": "RHSA-2013:0562", "cpe": "cpe:/a:redhat:enterprise_mrg:2:server:el6", "package": "qpid-jca-0:0.18-8.el6", "product_name": "Red Hat Enterprise MRG 2", "release_date": "2013-03-06T00:00:00Z"}, {"advisory": "RHSA-2013:0562", "cpe": "cpe:/a:redhat:enterprise_mrg:2:server:el6", "package": "qpid-qmf-0:0.18-15.el6", "product_name": "Red Hat Enterprise MRG 2", "release_date": "2013-03-06T00:00:00Z"}, {"advisory": "RHSA-2013:0562", "cpe": "cpe:/a:redhat:enterprise_mrg:2:server:el6", "package": "qpid-tests-0:0.18-2.el6", "product_name": "Red Hat Enterprise MRG 2", "release_date": "2013-03-06T00:00:00Z"}, {"advisory": "RHSA-2013:0562", "cpe": "cpe:/a:redhat:enterprise_mrg:2:server:el6", "package": "qpid-tools-0:0.18-8.el6", "product_name": "Red Hat Enterprise MRG 2", "release_date": "2013-03-06T00:00:00Z"}, {"advisory": "RHSA-2013:0562", "cpe": "cpe:/a:redhat:enterprise_mrg:2:server:el6", "package": "rhm-docs-0:0.18-2.el6", "product_name": "Red Hat Enterprise MRG 2", "release_date": "2013-03-06T00:00:00Z"}, {"advisory": "RHSA-2013:0562", "cpe": "cpe:/a:redhat:enterprise_mrg:2:server:el6", "package": "rubygem-rake-0:0.8.7-2.1.el6", "product_name": "Red Hat Enterprise MRG 2", "release_date": "2013-03-06T00:00:00Z"}, {"advisory": "RHSA-2013:0562", "cpe": "cpe:/a:redhat:enterprise_mrg:2:server:el6", "package": "rubygems-0:1.8.16-1.el6", "product_name": "Red Hat Enterprise MRG 2", "release_date": "2013-03-06T00:00:00Z"}, {"advisory": "RHSA-2013:0562", "cpe": "cpe:/a:redhat:enterprise_mrg:2:server:el6", "package": "saslwrapper-0:0.18-1.el6_3", "product_name": "Red Hat Enterprise MRG 2", "release_date": "2013-03-06T00:00:00Z"}, {"advisory": "RHSA-2013:0562", "cpe": "cpe:/a:redhat:enterprise_mrg:2:server:el6", "package": "xerces-c-0:3.0.1-20.el6", "product_name": "Red Hat Enterprise MRG 2", "release_date": "2013-03-06T00:00:00Z"}, {"advisory": "RHSA-2013:0562", "cpe": "cpe:/a:redhat:enterprise_mrg:2:server:el6", "package": "xqilla-0:2.2.3-8.el6", "product_name": "Red Hat Enterprise MRG 2", "release_date": "2013-03-06T00:00:00Z"}], "bugzilla": {"description": "qpid-cpp: long arrays of zero-width types cause a denial of service", "id": "861234", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=861234"}, "csaw": false, "cvss": {"cvss_base_score": "5.0", "cvss_scoring_vector": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "status": "verified"}, "details": ["The AMQP type decoder in Apache Qpid 0.20 and earlier allows remote attackers to cause a denial of service (memory consumption and server crash) via a large number of zero width elements in the client-properties map in a connection.start-ok message."], "name": "CVE-2012-4458", "package_state": [{"cpe": "cpe:/o:redhat:enterprise_linux:6", "fix_state": "Affected", "package_name": "qpid-cpp", "product_name": "Red Hat Enterprise Linux 6"}, {"cpe": "cpe:/a:redhat:enterprise_mrg:1", "fix_state": "Will not fix", "package_name": "qpid-cpp", "product_name": "Red Hat Enterprise MRG 1"}], "public_date": "2013-03-05T00:00:00Z", "references": ["https://www.cve.org/CVERecord?id=CVE-2012-4458\nhttps://nvd.nist.gov/vuln/detail/CVE-2012-4458\nhttps://issues.apache.org/jira/browse/QPID-4629"], "threat_severity": "Moderate"}