High Severity Vulnerability
This vulnerability has been rated as High severity. Immediate action is recommended.
CVE-2017-12174
HighVulnerability Description
It was found that when Artemis and HornetQ before 2.4.0 are configured with UDP discovery and JGroups discovery a huge byte array is created when receiving an unexpected multicast message. This may result in a heap memory exhaustion, full GC, or OutOfMemoryError.
CVSS Metrics
Common Vulnerability Scoring System
Vector String:
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Known Affected Software
27 configuration(s) from 2 vendor(s)
cpe:2.3:a:apache:activemq_artemis:1.1.0:*:*:*:*:*:*:*
cpe:2.3:a:apache:activemq_artemis:1.2.0:*:*:*:*:*:*:*
cpe:2.3:a:apache:activemq_artemis:1.5.0:*:*:*:*:*:*:*
cpe:2.3:a:apache:activemq_artemis:1.5.5:*:*:*:*:*:*:*
cpe:2.3:a:apache:activemq_artemis:1.5.1:*:*:*:*:*:*:*
cpe:2.3:a:apache:activemq_artemis:1.3.0:*:*:*:*:*:*:*
cpe:2.3:a:apache:activemq_artemis:1.5.2:*:*:*:*:*:*:*
cpe:2.3:a:apache:activemq_artemis:1.4.0:*:*:*:*:*:*:*
cpe:2.3:a:apache:activemq_artemis:1.5.6:*:*:*:*:*:*:*
cpe:2.3:a:apache:activemq_artemis:2.0.0:*:*:*:*:*:*:*
cpe:2.3:a:apache:activemq_artemis:1.0.0:*:*:*:*:*:*:*
cpe:2.3:a:apache:activemq_artemis:1.5.3:*:*:*:*:*:*:*
cpe:2.3:a:apache:activemq_artemis:2.1.0:*:*:*:*:*:*:*
cpe:2.3:a:apache:activemq_artemis:2.3.0:*:*:*:*:*:*:*
cpe:2.3:a:apache:activemq_artemis:1.5.4:*:*:*:*:*:*:*
cpe:2.3:a:apache:activemq_artemis:2.2.0:*:*:*:*:*:*:*
cpe:2.3:a:redhat:hornetq:2.1.2:*:*:*:*:*:*:*
cpe:2.3:a:redhat:hornetq:2.0.0:-:*:*:*:*:*:*
cpe:2.3:a:redhat:jboss_enterprise_application_platform:7.1.0:*:*:*:*:*:*:*
cpe:2.3:a:redhat:hornetq:2.2.14:*:*:*:*:*:*:*
cpe:2.3:a:redhat:hornetq:2.2.2:*:*:*:*:*:*:*
cpe:2.3:a:redhat:hornetq:2.3.0:-:*:*:*:*:*:*
cpe:2.3:a:redhat:hornetq:2.1.0:-:*:*:*:*:*:*
cpe:2.3:a:redhat:jboss_enterprise_application_platform:6.0.0:beta:*:*:*:*:*:*
cpe:2.3:a:redhat:hornetq:2.1.1:*:*:*:*:*:*:*
cpe:2.3:a:redhat:hornetq:2.2.5:*:*:*:*:*:*:*
cpe:2.3:a:redhat:jboss_enterprise_application_platform:6.4.0:*:*:*:*:*:*:*
References & Resources
-
https://access.redhat.com/errata/RHSA-2018:0268secalert@redhat.com Vendor Advisory
-
https://access.redhat.com/errata/RHSA-2018:0269secalert@redhat.com Vendor Advisory
-
https://access.redhat.com/errata/RHSA-2018:0270secalert@redhat.com Vendor Advisory
-
https://access.redhat.com/errata/RHSA-2018:0271secalert@redhat.com Vendor Advisory
-
https://access.redhat.com/errata/RHSA-2018:0275secalert@redhat.com Vendor Advisory
-
https://access.redhat.com/errata/RHSA-2018:0478secalert@redhat.com Vendor Advisory
-
https://access.redhat.com/errata/RHSA-2018:0479secalert@redhat.com Vendor Advisory
-
https://access.redhat.com/errata/RHSA-2018:0480secalert@redhat.com Vendor Advisory
-
https://access.redhat.com/errata/RHSA-2018:0481secalert@redhat.com Vendor Advisory
-
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2017-12174secalert@redhat.com Issue Tracking Vendor Advisory
-
https://lists.apache.org/thread.html/rb2fd3bf2dce042e0ab3f3c94c4767c96bb2e7e6737624d63162df36d%40%3Ccommits.activemq.apache.org%3Esecalert@redhat.com
-
https://lists.apache.org/thread.html/rc96ad63f148f784c84ea7f0a178c84a8985c6afccabbcd9847a82088%40%3Ccommits.activemq.apache.org%3Esecalert@redhat.com
-
https://access.redhat.com/errata/RHSA-2018:0268af854a3a-2127-422b-91ae-364da2661108 Vendor Advisory
-
https://access.redhat.com/errata/RHSA-2018:0269af854a3a-2127-422b-91ae-364da2661108 Vendor Advisory
-
https://access.redhat.com/errata/RHSA-2018:0270af854a3a-2127-422b-91ae-364da2661108 Vendor Advisory
-
https://access.redhat.com/errata/RHSA-2018:0271af854a3a-2127-422b-91ae-364da2661108 Vendor Advisory
-
https://access.redhat.com/errata/RHSA-2018:0275af854a3a-2127-422b-91ae-364da2661108 Vendor Advisory
-
https://access.redhat.com/errata/RHSA-2018:0478af854a3a-2127-422b-91ae-364da2661108 Vendor Advisory
-
https://access.redhat.com/errata/RHSA-2018:0479af854a3a-2127-422b-91ae-364da2661108 Vendor Advisory
-
https://access.redhat.com/errata/RHSA-2018:0480af854a3a-2127-422b-91ae-364da2661108 Vendor Advisory
-
https://access.redhat.com/errata/RHSA-2018:0481af854a3a-2127-422b-91ae-364da2661108 Vendor Advisory
-
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2017-12174af854a3a-2127-422b-91ae-364da2661108 Issue Tracking Vendor Advisory
-
https://lists.apache.org/thread.html/rb2fd3bf2dce042e0ab3f3c94c4767c96bb2e7e6737624d63162df36d%40%3Ccommits.activemq.apache.org%3Eaf854a3a-2127-422b-91ae-364da2661108
-
https://lists.apache.org/thread.html/rc96ad63f148f784c84ea7f0a178c84a8985c6afccabbcd9847a82088%40%3Ccommits.activemq.apache.org%3Eaf854a3a-2127-422b-91ae-364da2661108
Severity Details
Weakness Type (CWE)
Uncontrolled Resource Consumption
- Description
- The product does not properly control the allocation and maintenance of a limited resource.
- Exploit Likelihood
- High
- Typical Severity
- High
- Abstraction Level
- Class
Key Information
- Published Date
- March 07, 2018
