CVE-2023-46120

The RabbitMQ Java client library allows Java and JVM-based applications to connect to and interact with RabbitMQ nodes. `maxBodyLebgth` was not used when receiving Message objects. Attackers could send a very large Message causing a memory overflow and triggering an OOM Error. Users of RabbitMQ may suffer from DoS attacks from RabbitMQ Java client which will ultimately exhaust the memory of the consumer. This vulnerability was patched in version 5.18.0.
Configurations

Configuration 1 (hide)

cpe:2.3:a:vmware:rabbitmq_java_client:*:*:*:*:*:*:*:*

History

01 Nov 2023, 16:42

Type Values Removed Values Added
CWE CWE-400
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 7.5
CPE cpe:2.3:a:vmware:rabbitmq_java_client:*:*:*:*:*:*:*:*
First Time Vmware
Vmware rabbitmq Java Client
References (MISC) https://github.com/rabbitmq/rabbitmq-java-client/releases/tag/v5.18.0 - (MISC) https://github.com/rabbitmq/rabbitmq-java-client/releases/tag/v5.18.0 - Release Notes
References (MISC) https://github.com/rabbitmq/rabbitmq-java-client/security/advisories/GHSA-mm8h-8587-p46h - (MISC) https://github.com/rabbitmq/rabbitmq-java-client/security/advisories/GHSA-mm8h-8587-p46h - Exploit, Vendor Advisory
References (MISC) https://github.com/rabbitmq/rabbitmq-java-client/issues/1062 - (MISC) https://github.com/rabbitmq/rabbitmq-java-client/issues/1062 - Issue Tracking, Patch
References (MISC) https://github.com/rabbitmq/rabbitmq-java-client/commit/714aae602dcae6cb4b53cadf009323ebac313cc8 - (MISC) https://github.com/rabbitmq/rabbitmq-java-client/commit/714aae602dcae6cb4b53cadf009323ebac313cc8 - Patch

25 Oct 2023, 18:17

Type Values Removed Values Added
New CVE

Information

Published : 2023-10-25 18:17

Updated : 2023-11-01 16:42


NVD link : CVE-2023-46120

Mitre link : CVE-2023-46120


JSON object : View

Products Affected

vmware

  • rabbitmq_java_client
CWE
CWE-400

Uncontrolled Resource Consumption