CVE-2019-18609

Priority
Description
An issue was discovered in amqp_handle_input in amqp_connection.c in
rabbitmq-c 0.9.0. There is an integer overflow that leads to heap memory
corruption in the handling of CONNECTION_STATE_HEADER. A rogue server could
return a malicious frame header that leads to a smaller target_size value
than needed. This condition is then carried on to a memcpy function that
copies too much data into a heap buffer.
Assigned-to
leosilva
Notes
Package
Upstream:needs-triage
Ubuntu 12.04 ESM (Precise Pangolin):DNE
Ubuntu 14.04 ESM (Trusty Tahr):released (0.4.1-1ubuntu0.1~esm1)
Ubuntu 16.04 LTS (Xenial Xerus):released (0.7.1-1ubuntu0.2)
Ubuntu 18.04 LTS (Bionic Beaver):released (0.8.0-1ubuntu0.18.04.2)
Ubuntu 19.04 (Disco Dingo):released (0.9.0-0.2ubuntu0.19.04.1)
Ubuntu 19.10 (Eoan Ermine):released (0.9.0-0.2ubuntu0.19.10.1)
Ubuntu 20.04 (Focal Fossa):released (0.9.0-0.2ubuntu1)
Patches:
Upstream:https://github.com/alanxz/rabbitmq-c/commit/fc85be7123050b91b054e45b91c78d3241a5047a
More Information

Updated: 2020-01-13 13:15:12 UTC (commit 8c998e3bd98cf6f9fcc269d2cb7ef0100d3cff80)