Pivotal RabbitMQ, versions 3.7.x prior to 3.7.21 and 3.8.x prior to 3.8.1, and RabbitMQ for Pivotal Platform, 1.16.x versions prior to 1.16.7 and 1.17.x versions prior to 1.17.4, contain a web management plugin that is vulnerable to a denial of service attack. The "X-Reason" HTTP Header can be leveraged to insert a malicious Erlang format string that will expand and consume the heap, resulting in the server crashing.
References
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
Configuration 3 (hide)
|
Configuration 4 (hide)
|
History
02 Apr 2025, 14:13
Type | Values Removed | Values Added |
---|---|---|
First Time |
Broadcom rabbitmq Server
Broadcom |
|
CPE | cpe:2.3:a:broadcom:rabbitmq_server:*:*:*:*:*:*:*:* |
21 Nov 2024, 04:20
Type | Values Removed | Values Added |
---|---|---|
References | () https://access.redhat.com/errata/RHSA-2020:0078 - Third Party Advisory | |
References | () https://github.com/DrunkenShells/Disclosures/tree/master/CVE-2019-11287-DoS%20via%20Heap%20Overflow-RabbitMQ%20Web%20Management%20Plugin - Exploit, Third Party Advisory | |
References | () https://lists.debian.org/debian-lts-announce/2021/07/msg00011.html - Third Party Advisory | |
References | () https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/EEQ6O7PMNJKYFMQYHAB55L423GYK63SO/ - | |
References | () https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PYTGR3D5FW2O25RXZOTIZMOD2HAUVBE4/ - | |
References | () https://pivotal.io/security/cve-2019-11287 - Vendor Advisory |
07 Nov 2023, 03:02
Type | Values Removed | Values Added |
---|---|---|
References |
|
|
Information
Published : 2019-11-23 00:15
Updated : 2025-04-02 14:13
NVD link : CVE-2019-11287
Mitre link : CVE-2019-11287
CVE.ORG link : CVE-2019-11287
JSON object : View
Products Affected
debian
- debian_linux
pivotal_software
- rabbitmq
redhat
- openstack
fedoraproject
- fedora
broadcom
- rabbitmq_server