CVE-2018-11775

CVSS V2 Medium 5.8 CVSS V3 High 7.4
Description
TLS hostname verification when using the Apache ActiveMQ Client before 5.15.6 was missing which could make the client vulnerable to a MITM attack between a Java application using the ActiveMQ client and the ActiveMQ server. This is now enabled by default.
Overview
  • CVE ID
  • CVE-2018-11775
  • Assigner
  • security@apache.org
  • Vulnerability Status
  • Modified
  • Published Version
  • 2018-09-10T20:29:00
  • Last Modified Date
  • 2021-03-05T19:15:13
CPE Configuration (Product)
CPE Vulnerable Operator Version Start Version End
cpe:2.3:a:apache:activemq:*:*:*:*:*:*:*:* 1 OR 5.15.6
cpe:2.3:a:oracle:enterprise_repository:12.1.3.0.0:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:oracle:flexcube_private_banking:2.0.0.0:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:oracle:flexcube_private_banking:2.2.0.1:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:oracle:flexcube_private_banking:12.0.1.0:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:oracle:flexcube_private_banking:12.0.3.0:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:oracle:flexcube_private_banking:12.1.0.0:*:*:*:*:*:*:* 1 OR
CVSS Version 2
  • Version
  • 2.0
  • Vector String
  • AV:N/AC:M/Au:N/C:P/I:P/A:N
  • Access Vector
  • NETWORK
  • Access Compatibility
  • MEDIUM
  • Authentication
  • NONE
  • Confidentiality Impact
  • PARTIAL
  • Integrity Impact
  • PARTIAL
  • Availability Impact
  • NONE
  • Base Score
  • 5.8
  • Severity
  • MEDIUM
  • Exploitability Score
  • 8.6
  • Impact Score
  • 4.9
CVSS Version 3
  • Version
  • 3.0
  • Vector String
  • CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N
  • Attack Vector
  • NETWORK
  • Attack Compatibility
  • HIGH
  • Privileges Required
  • NONE
  • User Interaction
  • NONE
  • Scope
  • UNCHANGED
  • Confidentiality Impact
  • HIGH
  • Availability Impact
  • NONE
  • Base Score
  • 7.4
  • Base Severity
  • HIGH
  • Exploitability Score
  • 2.2
  • Impact Score
  • 5.2
References
Reference URL Reference Tags
http://activemq.apache.org/security-advisories.data/CVE-2018-11775-announcement.txt Vendor Advisory
http://www.securitytracker.com/id/1041618 Third Party Advisory VDB Entry
http://www.securityfocus.com/bid/105335 Third Party Advisory VDB Entry
https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html Patch Third Party Advisory
https://lists.apache.org/thread.html/2b5c0039197a4949f29e1e2c9441ab38d242946b966f61c110808bcc@%3Ccommits.activemq.apache.org%3E Mailing List Vendor Advisory
https://lists.apache.org/thread.html/fcbe6ad00f1de142148c20d813fae3765dc4274955e3e2f3ca19ff7b@%3Cdev.activemq.apache.org%3E Mailing List Vendor Advisory
https://lists.apache.org/thread.html/a859563f05fbe7c31916b3178c2697165bd9bbf5a65d1cf62aef27d2@%3Ccommits.activemq.apache.org%3E Mailing List Vendor Advisory
https://lists.apache.org/thread.html/03f91b1fb85686a848cee6b90112cf6059bd1b21b23bacaa11a962e1@%3Cdev.activemq.apache.org%3E Mailing List Vendor Advisory
https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html Patch Third Party Advisory
https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html
https://access.redhat.com/errata/RHSA-2019:3892
https://www.oracle.com/security-alerts/cpuapr2020.html
https://lists.apache.org/thread.html/rb698ed085f79e56146ca24ab359c9ef95846618675ea1ef402e04a6d@%3Ccommits.activemq.apache.org%3E
https://www.oracle.com/security-alerts/cpujan2021.html
https://lists.debian.org/debian-lts-announce/2021/03/msg00005.html
History
Created Old Value New Value Data Type Notes
2022-05-10 07:20:50 Added to TrackCVE
2022-12-03 11:58:50 2018-09-10T20:29Z 2018-09-10T20:29:00 CVE Published Date updated
2022-12-03 11:58:50 2021-03-05T19:15:13 CVE Modified Date updated
2022-12-03 11:58:50 Modified Vulnerability Status updated