Your submission was sent successfully! Close

You have successfully unsubscribed! Close

CVE-2016-9877

Published: 29 December 2016

An issue was discovered in Pivotal RabbitMQ 3.x before 3.5.8 and 3.6.x before 3.6.6 and RabbitMQ for PCF 1.5.x before 1.5.20, 1.6.x before 1.6.12, and 1.7.x before 1.7.7. MQTT (MQ Telemetry Transport) connection authentication with a username/password pair succeeds if an existing username is provided but the password is omitted from the connection request. Connections that use TLS with a client-provided certificate are not affected.

Priority

High

CVSS 3 base score: 9.8

Status

Package Release Status
rabbitmq-server
Launchpad, Ubuntu, Debian
precise Does not exist
(precise was needed)
trusty Does not exist
(trusty was released [3.2.4-1ubuntu0.1])
upstream
Released (3.5.8, 3.6.6)
xenial
Released (3.5.7-1ubuntu0.16.04.2)
yakkety Ignored
(reached end-of-life)
zesty Not vulnerable
(3.6.6-1)
Patches:
upstream: https://github.com/rabbitmq/rabbitmq-mqtt/commit/039a3c22e57bf77b325d19494a9b20cd745f1ea7 (3.7.0)
upstream: https://github.com/rabbitmq/rabbitmq-mqtt/commit/157948d86d391a325ac9702f78976c175ced58be (3.5.8)