Required CVE Record Information
Description
sys/ssl/SslSocket.cpp in qpidd in Apache Qpid, as used in Red Hat Enterprise MRG before 1.2.2 and other products, when SSL is enabled, allows remote attackers to cause a denial of service (daemon outage) by connecting to the SSL port but not participating in an SSL handshake.
References 6 Total
- redhat.com: RHSA-2010:0756 vendor-advisory
- openwall.com: [oss-security] 20101007 qpidd SSL connection DoS (CVE-2010-3083) mailing-list
- https://bugzilla.redhat.com/show_bug.cgi?id=632657
- http://svn.apache.org/viewvc/qpid/trunk/qpid/cpp/src/qpid/sys/ssl/SslSocket.cpp?r1=790291&r2=790290&pathrev=790291&view=patch
- secunia.com: 41710 third-party-advisory
- redhat.com: RHSA-2010:0757 vendor-advisory
Updated:
This container includes required additional information provided by the CVE Program for this vulnerability.
References 6 Total
- redhat.com: RHSA-2010:0756 vendor-advisoryx_transferred
- openwall.com: [oss-security] 20101007 qpidd SSL connection DoS (CVE-2010-3083) mailing-listx_transferred
- https://bugzilla.redhat.com/show_bug.cgi?id=632657 x_transferred
- http://svn.apache.org/viewvc/qpid/trunk/qpid/cpp/src/qpid/sys/ssl/SslSocket.cpp?r1=790291&r2=790290&pathrev=790291&view=patch x_transferred
- secunia.com: 41710 third-party-advisoryx_transferred
- redhat.com: RHSA-2010:0757 vendor-advisoryx_transferred